Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 10:45
Behavioral task
behavioral1
Sample
f9ec02b99f59f878178a7466f63110e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ec02b99f59f878178a7466f63110e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f9ec02b99f59f878178a7466f63110e0N.exe
-
Size
135KB
-
MD5
f9ec02b99f59f878178a7466f63110e0
-
SHA1
899ff5c063db7ea618b8474a5ffdc0554008ba50
-
SHA256
3d1fd0006670b2d55b364b9e2d227e502c7474362b1a88eff1ce6118dc96d03f
-
SHA512
15ee26091f86466361cf3aee2030b92c760f93289d03eb79147d1d5b91d7a5ac2f29d94b96d44dcec6b52882e2ceb5e5f49258323e44fd7655ea82adf61e9a2a
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOI:YfU/WF6QMauSuiWNi9eNOl0007NZIOI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 f9ec02b99f59f878178a7466f63110e0N.exe -
resource yara_rule behavioral1/files/0x0008000000016d0e-1.dat upx behavioral1/memory/2760-7-0x0000000000D20000-0x0000000000D48000-memory.dmp upx behavioral1/memory/2756-4-0x00000000003C0000-0x00000000003E8000-memory.dmp upx behavioral1/memory/2760-9-0x0000000000D20000-0x0000000000D48000-memory.dmp upx behavioral1/memory/2756-10-0x00000000003C0000-0x00000000003E8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" f9ec02b99f59f878178a7466f63110e0N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9ec02b99f59f878178a7466f63110e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2760 2756 f9ec02b99f59f878178a7466f63110e0N.exe 30 PID 2756 wrote to memory of 2760 2756 f9ec02b99f59f878178a7466f63110e0N.exe 30 PID 2756 wrote to memory of 2760 2756 f9ec02b99f59f878178a7466f63110e0N.exe 30 PID 2756 wrote to memory of 2760 2756 f9ec02b99f59f878178a7466f63110e0N.exe 30 PID 2756 wrote to memory of 2252 2756 f9ec02b99f59f878178a7466f63110e0N.exe 32 PID 2756 wrote to memory of 2252 2756 f9ec02b99f59f878178a7466f63110e0N.exe 32 PID 2756 wrote to memory of 2252 2756 f9ec02b99f59f878178a7466f63110e0N.exe 32 PID 2756 wrote to memory of 2252 2756 f9ec02b99f59f878178a7466f63110e0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ec02b99f59f878178a7466f63110e0N.exe"C:\Users\Admin\AppData\Local\Temp\f9ec02b99f59f878178a7466f63110e0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\f9ec02b99f59f878178a7466f63110e0N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5924ad91c041f1820d0950d261df4ff39
SHA12763e4a0112efdf569ec07311b2086cc40259d41
SHA2562b1a9dcafffd2c61bdd1fdf7ac06195746cce7a8467d139f0b6cb69a3aa58dc6
SHA5121d686e82d7fb4f1f7aa3c705019c640b180675db20a205ccec0a9a6adfb4d57fd1415cb9eafb70600d1e652da7ba42d53793f9f619a5b1a70b82eda83fdd98a1