Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:45
Behavioral task
behavioral1
Sample
1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe
Resource
win7-20240903-en
General
-
Target
1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe
-
Size
38KB
-
MD5
9697818d457dd5a9b4c00ca92af3c980
-
SHA1
f056336b17bf3189b3de017622060824e74dc8d6
-
SHA256
1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756e
-
SHA512
4ca3e0b12131d2474dd5f0d5d5c81f34e6d6794310b34bed85ca9600022b82600c443aab0ee0d71683cc7d9f4300bd5b7f41987b99ef99e91c5f3da568036028
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOGY6:NWQa2TLEmITcoQxfllfmS1cOL6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1284 smss.exe -
resource yara_rule behavioral2/memory/4172-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x00070000000234ac-5.dat upx behavioral2/memory/4172-11-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1284-13-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2712 sc.exe 636 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 1284 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4172 wrote to memory of 2712 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 82 PID 4172 wrote to memory of 2712 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 82 PID 4172 wrote to memory of 2712 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 82 PID 4172 wrote to memory of 1284 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 84 PID 4172 wrote to memory of 1284 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 84 PID 4172 wrote to memory of 1284 4172 1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe 84 PID 1284 wrote to memory of 636 1284 smss.exe 85 PID 1284 wrote to memory of 636 1284 smss.exe 85 PID 1284 wrote to memory of 636 1284 smss.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe"C:\Users\Admin\AppData\Local\Temp\1c9a536839258fffd9024a08add16d70d55b86caaec995621940f2916f18756eN.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5fc5e30bfe67be29086c5961d7912838a
SHA1b196849e2e2f9b8ec103743a30461c8e2b115c88
SHA2564cac23fc26d7a7107e5e5998e1932553490128c00b41b1d9d4062fb0850362c5
SHA512ffacc612f9f68e465d7ccca632301c4cb373169a6ae736b0b3d83fdd69bf7333f757ca85b4a67fb7bd71f9204f9368906f537aea056dd8bc9db31a132939b5c6