Analysis
-
max time kernel
73s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:51
Behavioral task
behavioral1
Sample
29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe
Resource
win7-20240903-en
General
-
Target
29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe
-
Size
38KB
-
MD5
de9d5e97ca5a4ef53a573e896f2b0da0
-
SHA1
621153f89ebaa1164e433e6f08c69bd3e689f2c7
-
SHA256
29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77
-
SHA512
af3eb3a54ec191a86b620afbb5d95a632be9bc2f99b3cf1455dde72bd3a2235c12ebeaf00b82e1cc120e48c0274d8f2f13fad904f8e3e05b92d78c05cc05829a
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOe2:NWQa2TLEmITcoQxfllfmS1cOe2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2288 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe -
resource yara_rule behavioral1/memory/2196-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x00070000000186de-9.dat upx behavioral1/memory/2196-20-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2288-18-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2784 sc.exe 2212 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 2288 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2212 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 31 PID 2196 wrote to memory of 2212 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 31 PID 2196 wrote to memory of 2212 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 31 PID 2196 wrote to memory of 2212 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 31 PID 2196 wrote to memory of 2288 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 33 PID 2196 wrote to memory of 2288 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 33 PID 2196 wrote to memory of 2288 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 33 PID 2196 wrote to memory of 2288 2196 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 33 PID 2288 wrote to memory of 2784 2288 smss.exe 34 PID 2288 wrote to memory of 2784 2288 smss.exe 34 PID 2288 wrote to memory of 2784 2288 smss.exe 34 PID 2288 wrote to memory of 2784 2288 smss.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe"C:\Users\Admin\AppData\Local\Temp\29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD558dcd5e2a14d8e3fa309566f6f60300a
SHA11e3e721790883c2f101687215457d2202bd3114d
SHA2564f85894261cea99e426e5333fc49ab3d822cd1b193d25f4edf0b56acb29ce8c5
SHA51246071b3fd6d366fb8a9ba7bfaf596e64826383bfbedb368d6e6148a2abad9e1bfd5def4609457b2fd955b5e57238644bdd58cf227f3f682ed5fe2ec25f30f3f3