Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe
Resource
win10v2004-20240802-en
General
-
Target
64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe
-
Size
245KB
-
MD5
fb52a22ee4c11f0ff70184a56b5cb800
-
SHA1
25a7374085fd245c680c155cfab32a51e7c36ad5
-
SHA256
64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45
-
SHA512
70e9d18a6c0c487354bedddf9bcdf204598f6f840355fb8fe644dddca16a2d4ea17fcde6d0c734e6cf6eea272410d77fb2b2f7529e3f02cf71158a34a0fd3dd5
-
SSDEEP
6144:PcNej2moaH9SBJQkfFuEIUCVscwrtNXZoeSbGqJq:P12RvLnIUCVsXtoeSa
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1656 emlssch.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\emlssch.exe 64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe File created C:\PROGRA~3\Mozilla\hsimtwa.dll emlssch.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emlssch.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2124 64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe 1656 emlssch.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1656 2308 taskeng.exe 32 PID 2308 wrote to memory of 1656 2308 taskeng.exe 32 PID 2308 wrote to memory of 1656 2308 taskeng.exe 32 PID 2308 wrote to memory of 1656 2308 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe"C:\Users\Admin\AppData\Local\Temp\64fe2b6740a189efb14526d0ab13288fa596bd76e0490726fae1b43cc5cfec45N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2124
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D06D552-4BD5-459A-884F-EDCA80ECC0D8} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\PROGRA~3\Mozilla\emlssch.exeC:\PROGRA~3\Mozilla\emlssch.exe -jioalan2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD57b6c3a077e513de36bbe96b256ee8593
SHA1e956d3e67bc166f9cc5ad84d9327f6ec68c185a3
SHA256f479dadcf8f4ea29542b1b371710a575fdf92a6fd3c2c1072cde4dd7fd5f711a
SHA5124018947f4e09e5f3dd5d1cb2c87e3c1a334c8c07be401333b6d5d60092017d55e04c966d8ebcc4d94af4847c55a6c0d68e1de1c46ef7a58bde979770d85944d0