Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:55
Behavioral task
behavioral1
Sample
38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe
Resource
win10v2004-20240802-en
General
-
Target
38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe
-
Size
135KB
-
MD5
39f7ab04b34db819a09a1d0e63dacbe0
-
SHA1
6a5c7d8737f1775e0782c52cdc19397c3c63a10c
-
SHA256
38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034
-
SHA512
9263c5d8e9299fea669407bffe0e896c06bdad827e42a70867e84043209c6c5aa6582e71f379b2de982294f9a598d18b19846f90408cb80fb87d2e3cf92f9f94
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOW:YfU/WF6QMauSuiWNi9eNOl0007NZIOW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe -
resource yara_rule behavioral1/memory/2788-0-0x00000000000C0000-0x00000000000E8000-memory.dmp upx behavioral1/files/0x0008000000016c62-2.dat upx behavioral1/memory/2812-7-0x0000000000F20000-0x0000000000F48000-memory.dmp upx behavioral1/memory/2788-8-0x00000000000C0000-0x00000000000E8000-memory.dmp upx behavioral1/memory/2812-10-0x0000000000F20000-0x0000000000F48000-memory.dmp upx behavioral1/memory/2788-11-0x00000000000C0000-0x00000000000E8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2812 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 31 PID 2788 wrote to memory of 2812 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 31 PID 2788 wrote to memory of 2812 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 31 PID 2788 wrote to memory of 2812 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 31 PID 2788 wrote to memory of 2560 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 32 PID 2788 wrote to memory of 2560 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 32 PID 2788 wrote to memory of 2560 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 32 PID 2788 wrote to memory of 2560 2788 38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe"C:\Users\Admin\AppData\Local\Temp\38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\38339841c531017a7d9ab863247552b0475646bee71b0daf4a33f80ec4d02034N.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5711c695a1e0bdafea9f50214d765a630
SHA180af834a956a6acb7cefc42a17b25e175027f5ab
SHA256238bb13a7d7b48768d7a0ea5782f8e0395787ecfd31c380d818c07261a2719bd
SHA51272e23eca9fc559f363acf11d974a3fc05c03267ff283c4a518228590f1c13c6aaa9105d5e2926a4eb51adf3f676bf82460cfec15cd5e018f6c374713495041c6