Analysis
-
max time kernel
111s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe
Resource
win10v2004-20240802-en
General
-
Target
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe
-
Size
3.0MB
-
MD5
6686cfc1e54c222aaebb740445aade20
-
SHA1
e021aa9730147cb596d320e890d611a8bb8f7f5f
-
SHA256
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5
-
SHA512
ad2dfb6a457b6c58e415f58743f2ab918c412ede0c70126cde56c1c2d566471f8a26b3186c8b7c3198bed342a0125eff9bf90362996d1d180b6c3267b408be23
-
SSDEEP
49152:B+ZBawcbuRhRRphn+ZBawcbuRhRRphgfxx33333U333R/EO:2xx33333U333R/EO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1996 LocalwsBNDGTKsa.exe 2704 New Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1780 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1780 vlc.exe 2112 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1780 vlc.exe Token: SeIncBasePriorityPrivilege 1780 vlc.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe 1780 vlc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1780 vlc.exe 2112 AcroRd32.exe 2112 AcroRd32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1996 2280 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 31 PID 2280 wrote to memory of 1996 2280 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 31 PID 2280 wrote to memory of 1996 2280 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 31 PID 2280 wrote to memory of 1780 2280 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 32 PID 2280 wrote to memory of 1780 2280 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 32 PID 2280 wrote to memory of 1780 2280 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 32 PID 1996 wrote to memory of 2376 1996 LocalwsBNDGTKsa.exe 33 PID 1996 wrote to memory of 2376 1996 LocalwsBNDGTKsa.exe 33 PID 1996 wrote to memory of 2376 1996 LocalwsBNDGTKsa.exe 33 PID 1996 wrote to memory of 2704 1996 LocalwsBNDGTKsa.exe 34 PID 1996 wrote to memory of 2704 1996 LocalwsBNDGTKsa.exe 34 PID 1996 wrote to memory of 2704 1996 LocalwsBNDGTKsa.exe 34 PID 1996 wrote to memory of 2704 1996 LocalwsBNDGTKsa.exe 34 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2704 wrote to memory of 2016 2704 New Client.exe 35 PID 2016 wrote to memory of 2112 2016 rundll32.exe 36 PID 2016 wrote to memory of 2112 2016 rundll32.exe 36 PID 2016 wrote to memory of 2112 2016 rundll32.exe 36 PID 2016 wrote to memory of 2112 2016 rundll32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe"C:\Users\Admin\AppData\Local\Temp\e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\LocalwsBNDGTKsa.exe"C:\Users\Admin\AppData\LocalwsBNDGTKsa.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\cfAUzMzm.webm"3⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\New Client.exe"C:\Users\Admin\AppData\Local\Temp\New Client.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MIcrosoft4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MIcrosoft"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\LocalkyFJdfVSIY..mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD572dcbd7d55a57e29652bc58848dd3e7e
SHA1ef89f80d7677b5fb6a93c53c26a3bb515f746ec5
SHA25651f65f413ac8faff2e9612bac975c3f3647355de902c370da0379be4e5d2a7a5
SHA5125537486738f5a6fa78e927f89f42de51c457e9143bef19c75eadbaeaeb450b395de60f4d17f005854f9eaacfd602a9a5d1cd536a67194f763e2e3a7f10517c28
-
Filesize
854KB
MD5d9f461ff253aad8d7683997fc65d3877
SHA1b05ac4846aff44a2d7859fdbfe870e3e9515ba04
SHA25615f297e1bfb3ee212f476ef405e7da9ea37ccd289c7e67ac8cb7fd7c113c50fc
SHA51206f3c022fd9b4323d6ce30632c0a9b1126720084438e78682557f43de91ddbf4a308b5c3cda4cc9c92f6145d650c9e5bab7343b8fb8698def118ec387b89b2bc
-
Filesize
1.3MB
MD5f9896bfa0340efc69aa84ef32e53bf80
SHA14ace5edf26daf72f6fa54372c558d838f5916f8a
SHA256b9ff8c78b466daabf8bd306903156a0ff3abead54c62bee33d3f9995c5c86348
SHA51228550a8149589ddbf136963cd20233d77b530258af48ed0e0e84168e31d7159bfbdc01728b96126ac668f1fb5fda903f12afe9db516af9bd1486202820343633
-
Filesize
3KB
MD51445b0d138e4a01b26463df2a8e3a13d
SHA195de60d71c7791adbde87789f94dc2afac08c7be
SHA256ccd61abb0c836c1d9021b0e9a33c7a19c10d76a56642eebb2f8ef051e900f612
SHA5120ba138fd7549f5674cd7f57a05ea702d888602bc54de001d4335715294ceffa08833d01e4687436f9473eb836acee7917f755b8c6969c3f3cf1ade05e05a219c