Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 02:58
Behavioral task
behavioral1
Sample
2561e34a79d477b74ee065ac7dcd09b0N.exe
Resource
win7-20240903-en
General
-
Target
2561e34a79d477b74ee065ac7dcd09b0N.exe
-
Size
69KB
-
MD5
2561e34a79d477b74ee065ac7dcd09b0
-
SHA1
8be7e155a68c99295a1d2499dc6d7b957feadbdb
-
SHA256
d4b7396e438e3b765824bfda728d6baa25e211aa62e5026631402015a9a7aee4
-
SHA512
312e1d795ec96220d3f47a13910c7b2e5a81ca628c3c2635fc90f1e11811b405e3e7a0327e7b6033c8199e5bb9c7cb70f687b51ab10995fabf9d6b3644b07389
-
SSDEEP
1536:0MwtZt0LljGy6uoRQBoyWbh8UH9SZ47Qn/DaBzv3NGxsNeNX:tOsZ6yDOH9SZ4uD+pA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 olacweegim.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 2561e34a79d477b74ee065ac7dcd09b0N.exe -
resource yara_rule behavioral1/memory/2700-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/files/0x000b000000012281-3.dat upx behavioral1/memory/2700-7-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2840-10-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2840-9-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2561e34a79d477b74ee065ac7dcd09b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language olacweegim.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2840 2700 2561e34a79d477b74ee065ac7dcd09b0N.exe 31 PID 2700 wrote to memory of 2840 2700 2561e34a79d477b74ee065ac7dcd09b0N.exe 31 PID 2700 wrote to memory of 2840 2700 2561e34a79d477b74ee065ac7dcd09b0N.exe 31 PID 2700 wrote to memory of 2840 2700 2561e34a79d477b74ee065ac7dcd09b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2561e34a79d477b74ee065ac7dcd09b0N.exe"C:\Users\Admin\AppData\Local\Temp\2561e34a79d477b74ee065ac7dcd09b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\olacweegim.exeC:\Users\Admin\AppData\Local\Temp\olacweegim.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD511112f028aa551e5c0cbaab89c0bd695
SHA18b5751cf7c7b3a607b3888a877726c586d44b2b7
SHA25600ce46d3b4864b754ec656e759a4151088fd55674e342c6f3b4d3a103e0184f7
SHA512e57d09bef98d2057240527c63d5d0d71b63b5224c12ced73b1169eedb704403791bdb2305cbad18f1f17cdfa0dc4265bb03e3eab0bcfbfb21aa023829c9061a2