Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe
Resource
win10v2004-20240802-en
General
-
Target
db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe
-
Size
588KB
-
MD5
a2c36ad07f9becaae9a7bbf740e1bbf4
-
SHA1
50aee7b0bb29a42b8892435b1e8b862b56ce48e4
-
SHA256
db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f
-
SHA512
2dbbeab604e41e1562f5563f4e5a6e5d266fd9c62d2b3741a6d7743d47ae921622d1efd56999c0791a9a6300a6ecc2889c656c4670c4708581ab6830e5c71dba
-
SSDEEP
6144:LSQv+4RgcbXRnUS+qvxBYKf5y8RUsOmvfO6/WuCyKxjoatEhg40uQRe+r:LS/4Rg2hun8RDXHWuCrNoU80uQRjr
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\E: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\I: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\J: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\L: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\O: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\R: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\Y: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\K: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\U: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\W: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\G: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\H: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\P: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\T: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\V: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\X: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\M: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\N: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\Q: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe File opened (read-only) \??\S: db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Logs\CoolInstall\CoolInstall.log db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1584 db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe 1584 db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4712 1584 db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe 82 PID 1584 wrote to memory of 4712 1584 db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe"C:\Users\Admin\AppData\Local\Temp\db2199bfa058105901b38511e93c8c98bdfc7f69f575e5156af77b461263378f.exe"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\temp\GetPart.bat2⤵PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD52d1f89869dc8657ffd579dee66f4b40b
SHA1c190ae3ea592b3e6307a8dc5b5c1182417fd640a
SHA256f724a5a958d36092a1dd2e8684edeb6da6ff82b99eeb4c32499f3b62649ccea8
SHA512ac3d1a098965160d52e615a7b87788c41ade851e941ad71c105a1c1f2246106a9c18b71b5a790a3d8a7815113ff072e1187ed05db55fd1d346fc5a022961be02