Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe
Resource
win10v2004-20240802-en
General
-
Target
e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe
-
Size
78KB
-
MD5
e9aa1ee59fa0c9fd23e6b53ef8d75d10
-
SHA1
88c95c7154b7b4b331d1930eecab7fa775459105
-
SHA256
9a2d2ef95e3c6fa28689fdc27c1689954342bfbc07fcf7ee1310a2873ad52ad1
-
SHA512
bcf33e3d2d205660ccf2b6be75366f6398e4c52a7aae8de7b375badb9eaec69c82b1f6d19ed429f07a0fda09787fe5a117331420eee16491e533cbf54cd12917
-
SSDEEP
1536:CyV5jSWAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtd6G9/l1r4:VV5jSWAtWDDILJLovbicqOq3o+n99/U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 tmp2FD.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmp2FD.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp2FD.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe Token: SeDebugPrivilege 2896 tmp2FD.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2424 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 30 PID 1444 wrote to memory of 2424 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 30 PID 1444 wrote to memory of 2424 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 30 PID 1444 wrote to memory of 2424 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 30 PID 2424 wrote to memory of 2836 2424 vbc.exe 32 PID 2424 wrote to memory of 2836 2424 vbc.exe 32 PID 2424 wrote to memory of 2836 2424 vbc.exe 32 PID 2424 wrote to memory of 2836 2424 vbc.exe 32 PID 1444 wrote to memory of 2896 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 33 PID 1444 wrote to memory of 2896 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 33 PID 1444 wrote to memory of 2896 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 33 PID 1444 wrote to memory of 2896 1444 e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe"C:\Users\Admin\AppData\Local\Temp\e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z6e60afi.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES407.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc406.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2FD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2FD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bc8def97a22488e19c4b01c1d2c81180
SHA11d59ee3094cd5b1628c25100fabb4703b615b86e
SHA256ccfd6716ca906f6dca5ada9689e43382ada735eab4b278d6a94df978ad74aa84
SHA512f600dbc51a771e58fa5b240cb0b52816500d2b608a2d9df5a58e320a778b1a6169bdccb547ce812150502b61751213744037e201d8007076000504e494ce211d
-
Filesize
78KB
MD591026473efa50b4d1af03da2d3c32ada
SHA152be3a2c734f76f83634d53105c1ecc6dc3ffb3f
SHA2567610854ff64ffb40b6601111ba033150166ef3fc9809f00a9791394ea27a1208
SHA51265e391545922e027af9aa6126ff3abfe036c2e6dadddb35a5e2d55d7bfa01dd459cac08cd187a5bd0e9f68b419ba80c9a68f586c6f0215ade6066df106964f41
-
Filesize
660B
MD58a39398d65c6ac165506dec0d29ee560
SHA16d20b3c2931d73340444f7a99cd93bc1a177e828
SHA256fd178081e4286c8cc442291ca5ace300e881acf73820244924d50cd135879dbb
SHA51273e528c7f59633974e7504798cb615d149cf8a45b6ddaa789a966128b4e8f4740f56e11e8b307fc0adf0e9e603f2d1494bb70dbf7b5a36ef43217aa916138217
-
Filesize
14KB
MD505c5c18613bc05a39aa1d536496fe03a
SHA18a40167d5d28d40a292cf65b763336bc04cc2ef5
SHA256731855d6af1881c1ccfc0e29fe8cecb442fd75227347196d081b5396f31e44f9
SHA51284a28f1e179756fbff25f4fbdb13045c94acefeee886ff725e6ad4bdc0ebbe64b9a3c589140c83d76c2d02d0f9ceb296dd59244189277b57d2e1dcfab0b3218e
-
Filesize
265B
MD56c211852c05afd95ba6fa4425bf65ddc
SHA1f052624c6995d482700925b13f1a901cb4e1bde2
SHA256e2bd34bf82a9522d912c1388d23861233dfa10d9567998b9336ffbb6b9a33726
SHA512635f01f619f600b944be23c9223237cbf5e6da07c5f7af6ec6ce7b2f4fbdcf291719141ebe6e96afbcd4c46e8eab82f4046dcb92dbe93c14be2b386684afe77f
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c