Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe
Resource
win7-20240903-en
General
-
Target
826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe
-
Size
413KB
-
MD5
586c5ac34c86291bac60c8e223aef094
-
SHA1
80cd750b35f09ecb88a31ca9166a4e3252a14423
-
SHA256
826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36
-
SHA512
0733293ef0b785d7aa237b640251824ee125eda4c2b0a26d307a3d05d82d1a9ac5d5912438945d9f743decc9eccf4517f17dc9ec5199b7f50d261bd03e4361a0
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUS:ITNYrnE3bm/CiejewY5vR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1068 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2548 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1068 2548 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe 30 PID 2548 wrote to memory of 1068 2548 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe 30 PID 2548 wrote to memory of 1068 2548 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe 30 PID 2548 wrote to memory of 1068 2548 826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe 30 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31 PID 1068 wrote to memory of 2688 1068 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe"C:\Users\Admin\AppData\Local\Temp\826384807c0348993c782416921adf09f281f8b18aae261d1d30d3c6dd0a6b36.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD55145669116cdeaf24b4298cb63776bbe
SHA1dd2b5f7b5922f1ea4f3db6ac121ded4108a6f0ca
SHA2569cd6822a5dbbee99158b6e57f1afc414ada7d46b3b1b63770f933db783aad6b4
SHA5126f27b1a33de6d5c6f9939bd5653c1c2fc975a4d9fa80f5c1843afd981a350ef0c4640b50ce8cce435bcacd7c53901e102c9cf1ad3bd5a67824b50768d65efc99