Analysis
-
max time kernel
54s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:10
Behavioral task
behavioral1
Sample
7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe
Resource
win7-20240708-en
General
-
Target
7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe
-
Size
140KB
-
MD5
e38d8659129aef632adcb71c424ab810
-
SHA1
4d4d540da03d29c12167ad54b33f3fde0d3169ec
-
SHA256
7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8
-
SHA512
34cb9281220b7e7a9c9768c0daf19277f8264de697ead7376d80969d200664125fec01515a1feb1736c53229fc1ac30950265d005dba9f94d3cc7994df105b0d
-
SSDEEP
3072:hyRvQ8nQ0d2CRi9LkQ7Bli1BvY5CAFmhDEd5IQ:MjnQ0d9Q7QDEd5D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 Kxodya.exe -
resource yara_rule behavioral1/memory/3012-1-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0008000000016140-12.dat upx behavioral1/memory/3028-13-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\18RH6WMFH2 = "C:\\Windows\\Kxodya.exe" Kxodya.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe File created C:\Windows\Kxodya.exe 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe File opened for modification C:\Windows\Kxodya.exe 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kxodya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main Kxodya.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe 3028 Kxodya.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3012 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 3028 Kxodya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3028 3012 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 30 PID 3012 wrote to memory of 3028 3012 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 30 PID 3012 wrote to memory of 3028 3012 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 30 PID 3012 wrote to memory of 3028 3012 7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe"C:\Users\Admin\AppData\Local\Temp\7a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Kxodya.exeC:\Windows\Kxodya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5e38d8659129aef632adcb71c424ab810
SHA14d4d540da03d29c12167ad54b33f3fde0d3169ec
SHA2567a55b1145967e944fdf6d54527dd47280e1df1cda54cb1684a8b8eebf0da01d8
SHA51234cb9281220b7e7a9c9768c0daf19277f8264de697ead7376d80969d200664125fec01515a1feb1736c53229fc1ac30950265d005dba9f94d3cc7994df105b0d
-
Filesize
410B
MD5e9c272d9f114b85aa813fc585ecddaea
SHA124125db252fb31c51d8dcf581c3c3537b1ba55b3
SHA2561122d9606ef76c0383d59f167bdbacef6c720a2fa3ed4e31c75da5ae83e2672b
SHA5123cb6c54a4dba78bc5adcb65965b0e5fe040489a6a4132e51d79469ae4e375eb7dbbfe3007cf45154c647c28eeb10a1c7da050bf1c136236265ec50b8c4a45da0