Analysis
-
max time kernel
79s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:05
Behavioral task
behavioral1
Sample
fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe
Resource
win7-20240903-en
General
-
Target
fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe
-
Size
38KB
-
MD5
8ada2f4c4545d4d734e6a7b69a795f50
-
SHA1
0abcf93659b3c19c8bdbab3b80b4293715aa1990
-
SHA256
fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877
-
SHA512
aa662ab2105a3bf064eae3f3659f30647064ee40736a8fc9dae63270041fd0be14c3add7d42d9a15d6471ed49b3b12731dcc5ce3c023db3435323e85de860635
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cONb:NWQa2TLEmITcoQxfllfmS1cOl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x0008000000016dbe-4.dat upx behavioral1/memory/2744-13-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3052-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2744-21-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2752 sc.exe 2692 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 2744 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2692 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 31 PID 3052 wrote to memory of 2692 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 31 PID 3052 wrote to memory of 2692 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 31 PID 3052 wrote to memory of 2692 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 31 PID 3052 wrote to memory of 2744 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 33 PID 3052 wrote to memory of 2744 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 33 PID 3052 wrote to memory of 2744 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 33 PID 3052 wrote to memory of 2744 3052 fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe 33 PID 2744 wrote to memory of 2752 2744 smss.exe 34 PID 2744 wrote to memory of 2752 2744 smss.exe 34 PID 2744 wrote to memory of 2752 2744 smss.exe 34 PID 2744 wrote to memory of 2752 2744 smss.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe"C:\Users\Admin\AppData\Local\Temp\fa61f905efbe754cc3ca80590c426235e6a0f4f4c02369ed82021c70f9dcc877N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD54100d95f7bbf61e418dbee6053050433
SHA19dd516f6c79d092367a8fdca6a26fddf5c4d1b89
SHA25609d7da277305babf13d70399e5b1ddea30069f12e16674f912dde16bee3a7714
SHA512b83205fa4c5238ad91af68fc7b4146f2a8d93ecbceac472ab6749b0bdb2e24043cda637909443cabef9d7c29ea6b2a0ab76c1fe73b1a34b2bec3caa356cc2d4d