Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/09/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe
Resource
win10v2004-20240802-en
General
-
Target
511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe
-
Size
45.0MB
-
MD5
2735aa6b088eb9db69fbb5aee54f9518
-
SHA1
51b08327ca7e95998d6edb02cb635bd136f11def
-
SHA256
511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3
-
SHA512
e9611187c3295f5ed37bc3714ab5b14dd81ff46457a52575c1a58ae4f279ee5549a1d7510cb620188046a77906334bd76799295b0c3b5a47825a215e9db787d8
-
SSDEEP
786432:d/Zs2yAk/aI86tNyUP5VfoPYY73ZDgSgwiWYcjiil8stBnpfWeIn3fVkIlsWUsDb:d/Z3yAk/aVUxpoPYmPlPPx9G3fVgA4k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 244 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Kills process with taskkill 2 IoCs
pid Process 4732 taskkill.exe 2068 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4732 taskkill.exe Token: SeDebugPrivilege 2068 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2296 wrote to memory of 440 2296 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe 81 PID 2296 wrote to memory of 440 2296 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe 81 PID 2296 wrote to memory of 440 2296 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe 81 PID 440 wrote to memory of 4732 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 82 PID 440 wrote to memory of 4732 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 82 PID 440 wrote to memory of 4732 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 82 PID 440 wrote to memory of 2068 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 85 PID 440 wrote to memory of 2068 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 85 PID 440 wrote to memory of 2068 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 85 PID 440 wrote to memory of 244 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 87 PID 440 wrote to memory of 244 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 87 PID 440 wrote to memory of 244 440 511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe"C:\Users\Admin\AppData\Local\Temp\511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\is-POBJ9.tmp\511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp"C:\Users\Admin\AppData\Local\Temp\is-POBJ9.tmp\511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp" /SL5="$40220,46398608,813568,C:\Users\Admin\AppData\Local\Temp\511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /F /im servers.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /F /im Telegram.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" delete WindowsTaskHostProcSvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-POBJ9.tmp\511267e4e58db76b91fd2e6fc561d58178d127de256864edd1d55980bd7662f3.tmp
Filesize2.5MB
MD5cbd88ebe6dd20ceb35e5773622452a33
SHA10fbce55cc0311b977484ed0f74e43a8c80884fc5
SHA256fc251ad0fc9a6f44652e8d4b403318dffb6c7bacd472d85589658fe9f8e2bea2
SHA512648340d42cf50dfe9673e050a42cb80b04f77fe77313bb9b4258875a76fcb81957c70303c23af26cb305ef8be8920824113812bee1b1cba5d90c1cfc79d46447