Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe
Resource
win10v2004-20240802-en
General
-
Target
9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe
-
Size
225KB
-
MD5
9bdb0626f6c5923879be1363fda6b9a2
-
SHA1
0eee76ab62eb975fdebb89b4e8998c31bd80482c
-
SHA256
9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013
-
SHA512
99eb7b4224563e1797137bb05aff5a18e750951692f4af44adaffab76598e3c680282b61d9572e47a25906326be0d61795118727e36888380c44b9ca8379373e
-
SSDEEP
6144:dA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:dATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\125BA6B8 = "C:\\Users\\Admin\\AppData\\Roaming\\125BA6B8\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe 2680 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2680 1476 9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe 30 PID 1476 wrote to memory of 2680 1476 9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe 30 PID 1476 wrote to memory of 2680 1476 9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe 30 PID 1476 wrote to memory of 2680 1476 9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe 30 PID 1476 wrote to memory of 2680 1476 9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe 30 PID 2680 wrote to memory of 1184 2680 winver.exe 21 PID 2680 wrote to memory of 1104 2680 winver.exe 19 PID 2680 wrote to memory of 1160 2680 winver.exe 20 PID 2680 wrote to memory of 1184 2680 winver.exe 21 PID 2680 wrote to memory of 1520 2680 winver.exe 25 PID 2680 wrote to memory of 1476 2680 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe"C:\Users\Admin\AppData\Local\Temp\9a202ba95c20cb17823b16cfc1c95b6d334023b1c67317334f20962cc28e3013.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2680
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1520