Analysis
-
max time kernel
81s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 12:57
Behavioral task
behavioral1
Sample
8a5a047fc0d402d81c5e119941047400N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a5a047fc0d402d81c5e119941047400N.exe
Resource
win10v2004-20240802-en
General
-
Target
8a5a047fc0d402d81c5e119941047400N.exe
-
Size
111KB
-
MD5
8a5a047fc0d402d81c5e119941047400
-
SHA1
6448d8f68a01e5453e2567522adce715c67e1b41
-
SHA256
eed05eb64668a28db2803b7f16a3cf1659293c2e7ecc2a219834bda950936d3f
-
SHA512
580fc033946c6bce3573dde104d44c8890b44e47154acff31e1929f87a99530fe346b066ef13905e41e4db495f1b7a737871174dc847cb2e739b23043b6aa59d
-
SSDEEP
1536:ELNIW39SaZTbFARlq7jC1OZstZu0TSVEdUJWTWd18fBq:ELlbZTZX3BAtTSVEdUJWTWd18fc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2972 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 guifx.exe -
Loads dropped DLL 1 IoCs
pid Process 1120 8a5a047fc0d402d81c5e119941047400N.exe -
resource yara_rule behavioral1/memory/1120-0-0x0000000000B70000-0x0000000000B8C000-memory.dmp upx behavioral1/files/0x0007000000018bac-2.dat upx behavioral1/memory/2308-7-0x0000000000250000-0x000000000026C000-memory.dmp upx behavioral1/memory/1120-8-0x0000000000B70000-0x0000000000B8C000-memory.dmp upx behavioral1/memory/1120-10-0x0000000000B70000-0x0000000000B8C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graphics = "\"C:\\ProgramData\\Graphics\\guifx.exe\" /run" 8a5a047fc0d402d81c5e119941047400N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a5a047fc0d402d81c5e119941047400N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guifx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2308 1120 8a5a047fc0d402d81c5e119941047400N.exe 29 PID 1120 wrote to memory of 2308 1120 8a5a047fc0d402d81c5e119941047400N.exe 29 PID 1120 wrote to memory of 2308 1120 8a5a047fc0d402d81c5e119941047400N.exe 29 PID 1120 wrote to memory of 2308 1120 8a5a047fc0d402d81c5e119941047400N.exe 29 PID 1120 wrote to memory of 2972 1120 8a5a047fc0d402d81c5e119941047400N.exe 30 PID 1120 wrote to memory of 2972 1120 8a5a047fc0d402d81c5e119941047400N.exe 30 PID 1120 wrote to memory of 2972 1120 8a5a047fc0d402d81c5e119941047400N.exe 30 PID 1120 wrote to memory of 2972 1120 8a5a047fc0d402d81c5e119941047400N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a5a047fc0d402d81c5e119941047400N.exe"C:\Users\Admin\AppData\Local\Temp\8a5a047fc0d402d81c5e119941047400N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\ProgramData\Graphics\guifx.exe"C:\ProgramData\Graphics\guifx.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\8a5a047fc0d402d81c5e119941047400N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD54c7c33fdda416a8054c9ca23bf3fed9b
SHA1ee9f5196ab8689781f6a9b20529d2d17a05fd288
SHA25647df0d50f7b59518e1e12caa70bc7c426fcffc46a32d9c606994d75d09322b61
SHA51227bfd7e40afb36f44e8e83ee29a4c6c7c029b8c01f70123252546ded231d0e67e7599261066fbea3d33540451c6dde25979760684a1b5a1f506f63cef1657ef6