Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 04:46
Behavioral task
behavioral1
Sample
8f44351767e943bf9804ae4cdd613800N.exe
Resource
win7-20240903-en
General
-
Target
8f44351767e943bf9804ae4cdd613800N.exe
-
Size
38KB
-
MD5
8f44351767e943bf9804ae4cdd613800
-
SHA1
b00fa7c98ade8e990518b59ebfa74cdc9ed98d1f
-
SHA256
c42f989cc93e7438485468781f120b1e3c93c4de311ccb2f252d32c83e4781e8
-
SHA512
afb33c221405ed46df1fd3281e98ee793d3999e9107cccc7906eb26c6aa3080d494d6e9d7936fadb7330c4e41e1e1c87104053d521493b3e057303e0f3a3687e
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOi:NWQa2TLEmITcoQxfllfmS1cOi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1416 smss.exe -
resource yara_rule behavioral2/memory/1356-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x00080000000234c0-5.dat upx behavioral2/memory/1356-10-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1416-12-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 8f44351767e943bf9804ae4cdd613800N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2432 sc.exe 3248 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f44351767e943bf9804ae4cdd613800N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1356 8f44351767e943bf9804ae4cdd613800N.exe 1416 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2432 1356 8f44351767e943bf9804ae4cdd613800N.exe 84 PID 1356 wrote to memory of 2432 1356 8f44351767e943bf9804ae4cdd613800N.exe 84 PID 1356 wrote to memory of 2432 1356 8f44351767e943bf9804ae4cdd613800N.exe 84 PID 1356 wrote to memory of 1416 1356 8f44351767e943bf9804ae4cdd613800N.exe 86 PID 1356 wrote to memory of 1416 1356 8f44351767e943bf9804ae4cdd613800N.exe 86 PID 1356 wrote to memory of 1416 1356 8f44351767e943bf9804ae4cdd613800N.exe 86 PID 1416 wrote to memory of 3248 1416 smss.exe 88 PID 1416 wrote to memory of 3248 1416 smss.exe 88 PID 1416 wrote to memory of 3248 1416 smss.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f44351767e943bf9804ae4cdd613800N.exe"C:\Users\Admin\AppData\Local\Temp\8f44351767e943bf9804ae4cdd613800N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5a395878bc1d6d2bb26c8f01394db23df
SHA16012779322e129c72ba241d93be4964abc63502e
SHA256246c4f8514bac21630cfa38222f8f9cd044cc65d4ed64b3931f15f13389c338a
SHA512b6667d52e0d65af6b6c6e7b7b142c836b4074a221e9990217b27177ffcb0dceba06d82c14d8c20cf8f59356553831512bde6f8ba3ed75ec2bd67b6abe0c4ec8b