Analysis
-
max time kernel
113s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 08:56
Behavioral task
behavioral1
Sample
66a64b8fb8d7101a6884b5e713c293c0N.exe
Resource
win7-20240903-en
General
-
Target
66a64b8fb8d7101a6884b5e713c293c0N.exe
-
Size
75KB
-
MD5
66a64b8fb8d7101a6884b5e713c293c0
-
SHA1
311f248ec9720ffb98f93da9c6324d6df7b5227c
-
SHA256
f48f857867190f861748cdda7e80138283251710eb3b35967fffe4070d33e393
-
SHA512
4fce9cbfcfcc5efcce0069a4c1382886f85c4975035a0fa87a5321079c18a467db7265b6826745e3769e5486b4f9233d6bbd8da1c559c52fbe1d99db52fb97b6
-
SSDEEP
1536:RRkDnTSWukyxHE+JBWC7KnI4KTwTPGsvvkcCvMt0IRUKFsREAQ07oyZBr6RpnOVV:KnT6kyxdL9L0bGdcCvS0IRUKFsREAQ0Z
Malware Config
Signatures
-
Detects Andromeda payload. 5 IoCs
resource yara_rule behavioral1/memory/2688-8-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral1/memory/2688-6-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral1/memory/2688-15-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral1/memory/2876-20-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda behavioral1/memory/2876-24-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\19572 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccrzuaato.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe -
resource yara_rule behavioral1/memory/2892-0-0x0000000000400000-0x000000000059D000-memory.dmp upx behavioral1/files/0x0008000000015415-9.dat upx behavioral1/memory/2892-14-0x0000000000400000-0x000000000059D000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2892 set thread context of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccrzuaato.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a64b8fb8d7101a6884b5e713c293c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a64b8fb8d7101a6884b5e713c293c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2892 wrote to memory of 2688 2892 66a64b8fb8d7101a6884b5e713c293c0N.exe 30 PID 2688 wrote to memory of 2876 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe 31 PID 2688 wrote to memory of 2876 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe 31 PID 2688 wrote to memory of 2876 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe 31 PID 2688 wrote to memory of 2876 2688 66a64b8fb8d7101a6884b5e713c293c0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a64b8fb8d7101a6884b5e713c293c0N.exe"C:\Users\Admin\AppData\Local\Temp\66a64b8fb8d7101a6884b5e713c293c0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\66a64b8fb8d7101a6884b5e713c293c0N.exe"C:\Users\Admin\AppData\Local\Temp\66a64b8fb8d7101a6884b5e713c293c0N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD566a64b8fb8d7101a6884b5e713c293c0
SHA1311f248ec9720ffb98f93da9c6324d6df7b5227c
SHA256f48f857867190f861748cdda7e80138283251710eb3b35967fffe4070d33e393
SHA5124fce9cbfcfcc5efcce0069a4c1382886f85c4975035a0fa87a5321079c18a467db7265b6826745e3769e5486b4f9233d6bbd8da1c559c52fbe1d99db52fb97b6