Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe
Resource
win10v2004-20240802-en
General
-
Target
072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe
-
Size
22KB
-
MD5
35e1da9d75172743eaa20a006ebf281a
-
SHA1
03194e6f9732b414e4c5a391de553e0ba77d6fb2
-
SHA256
072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57
-
SHA512
975e6a18acad06a467afbb3ffeeb553d0041013b5f4be1dba84739ad4f6d078a0062b38c724ca1c1e125afbdc89af8992b3dd90a3c04c7ea911940115e23b9bf
-
SSDEEP
384:2p/c7+UldIjKDKYJZd1WwKoYe68ZS6jKFWY:A/E+UlejKbjWwKtUZS6O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 edxmk.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edxmk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2188 2196 072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe 31 PID 2196 wrote to memory of 2188 2196 072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe 31 PID 2196 wrote to memory of 2188 2196 072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe 31 PID 2196 wrote to memory of 2188 2196 072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe"C:\Users\Admin\AppData\Local\Temp\072c2e99429b7b3b0e421fd54911241d2eabeadd2dfe89d92899a2b406a48b57.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\edxmk.exe"C:\Users\Admin\AppData\Local\Temp\edxmk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD59a1d74906adf6a16afd4c5c1495494d4
SHA19709bc4fe3d45f48816d05d2c0f67ed4c3f8288d
SHA2563bd605da34187dfc3901fdc6415cb2a000a307fbc49bc9896818a579ba87c21f
SHA5120fb6cb8796f02921e4631b757b0d47fd7fbe5e554f197c73f68c5f179804b99c28dff55db15edf58729c14dae08e19c5e8314b11d022e1602a023fe097738347