Analysis
-
max time kernel
97s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe
Resource
win10v2004-20240802-en
General
-
Target
c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe
-
Size
225KB
-
MD5
3e5818f49741e0cf2bbda011e594b6d0
-
SHA1
4f14d78becf5c83bee21c7d5edbe71bb73333c9a
-
SHA256
c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8
-
SHA512
fcee7ed658956e856c156f186649c8ec39a67b3e043caf841ab2efb453059c52242e391782acc347f86f6096a930ce8ef747ca8f05703bb3350a2d80f4ced5a7
-
SSDEEP
3072:sSsdVRsAXg7M1Y3nz520NMoNoD7NQK7X6E:sndVRsAXg4C3z520NlYNqE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4708 877.pif -
Executes dropped EXE 2 IoCs
pid Process 4708 877.pif 4200 c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 877.pif File opened (read-only) \??\O: 877.pif File opened (read-only) \??\T: 877.pif File opened (read-only) \??\G: 877.pif File opened (read-only) \??\I: 877.pif File opened (read-only) \??\K: 877.pif File opened (read-only) \??\Z: 877.pif File opened (read-only) \??\J: 877.pif File opened (read-only) \??\W: 877.pif File opened (read-only) \??\X: 877.pif File opened (read-only) \??\L: 877.pif File opened (read-only) \??\M: 877.pif File opened (read-only) \??\Q: 877.pif File opened (read-only) \??\R: 877.pif File opened (read-only) \??\S: 877.pif File opened (read-only) \??\U: 877.pif File opened (read-only) \??\V: 877.pif File opened (read-only) \??\E: 877.pif File opened (read-only) \??\H: 877.pif File opened (read-only) \??\P: 877.pif File opened (read-only) \??\Y: 877.pif -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\calc.exe15724 877.pif File opened for modification C:\Windows\SysWOW64\ctfmon.exe26962 877.pif File opened for modification C:\Windows\SysWOW64\RCX7D8F.tmp 877.pif File opened for modification C:\Windows\SysWOW64\RCX7E2D.tmp 877.pif File opened for modification C:\Windows\SysWOW64\userinit.exe18467 877.pif File opened for modification C:\Windows\SysWOW64\RCX7985.tmp 877.pif File opened for modification C:\Windows\SysWOW64\RCX7B4B.tmp 877.pif File opened for modification C:\Windows\SysWOW64\notepad.exe11478 877.pif File opened for modification C:\Windows\SysWOW64\RCX7BD9.tmp 877.pif File opened for modification C:\Windows\SysWOW64\cleanmgr.exe24464 877.pif -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 877.pif -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3156 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1076 wrote to memory of 4708 1076 c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe 82 PID 1076 wrote to memory of 4708 1076 c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe 82 PID 1076 wrote to memory of 4708 1076 c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe 82 PID 4708 wrote to memory of 4200 4708 877.pif 91 PID 4708 wrote to memory of 4200 4708 877.pif 91 PID 4708 wrote to memory of 4200 4708 877.pif 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe"C:\Users\Admin\AppData\Local\Temp\c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\877.pifC:\Users\Admin\AppData\Local\Temp\877.pif ////DAEMON2⤵
- Deletes itself
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe"C:\Users\Admin\AppData\Local\Temp\c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4200
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD598da3c0e78ba49a30a2b7ccda7365fdd
SHA19c665f41025b3ac2ab9958f0c74e9aa0e9efcfad
SHA256394c38ebb0e2857127009e2e125eca8bcc0317e07031404c3a49d4e77bd6d15f
SHA51235403fcddfb529870a29f329a9634112e85a4826e4cda1a8c7fc37e5431b0f7a1c43dc72cd9dbeb262dd171f673840d8aaea69dadb9382a6e619675a966e193e
-
C:\Users\Admin\AppData\Local\Temp\c9ebae213732c79aae34cdd085da04accae29e324d09b22b129055a802ab91b8N.exe
Filesize25KB
MD50975ee4bd09e87c94861f69e4aa44b7a
SHA164029e26a179b64951ca580a155288b6ff002a55
SHA2567f8aa55beae4aee0da0f32b8d67b3d600103fedd99c6e114625f82de8d14d5c7
SHA51287eff707ac6b74c98902cefab12e9e37c51eb01e9b8cf7336ae6299f27b43abbdd27d9775984c797f0e2644bb35812fa09d2ccd88c6cbba8c5f87b70f52e4f81
-
Filesize
227KB
MD53690e25bb94422d800080b6709ac4bd8
SHA137160c339f0e3f38eb460dbf56c9a27b1df03d29
SHA256cee14fef4701ead1788b62afba1bac4a99fe89ec235aaf8e2080193d1b895d1d
SHA512883ca797847f5f30355bb014c3b33e49171a4e5ba6f1715dcaa506c82ce655be590ec73f748452f1331c840943f8b339de2e3a15087bd6796fc2794ad7490e45