Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:51
Behavioral task
behavioral1
Sample
29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe
Resource
win7-20240903-en
General
-
Target
29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe
-
Size
38KB
-
MD5
de9d5e97ca5a4ef53a573e896f2b0da0
-
SHA1
621153f89ebaa1164e433e6f08c69bd3e689f2c7
-
SHA256
29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77
-
SHA512
af3eb3a54ec191a86b620afbb5d95a632be9bc2f99b3cf1455dde72bd3a2235c12ebeaf00b82e1cc120e48c0274d8f2f13fad904f8e3e05b92d78c05cc05829a
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOe2:NWQa2TLEmITcoQxfllfmS1cOe2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 700 smss.exe -
resource yara_rule behavioral2/memory/4808-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x0007000000023454-5.dat upx behavioral2/memory/4808-11-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/700-13-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4660 sc.exe 4960 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 700 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4660 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 82 PID 4808 wrote to memory of 4660 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 82 PID 4808 wrote to memory of 4660 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 82 PID 4808 wrote to memory of 700 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 84 PID 4808 wrote to memory of 700 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 84 PID 4808 wrote to memory of 700 4808 29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe 84 PID 700 wrote to memory of 4960 700 smss.exe 85 PID 700 wrote to memory of 4960 700 smss.exe 85 PID 700 wrote to memory of 4960 700 smss.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe"C:\Users\Admin\AppData\Local\Temp\29816ba5444d408c5f4c2d836a0c296a9c993de55b02184208e7fb568c0dca77N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5c0cdb37547c9f558231b68b5732d2f8c
SHA14e4a48367a8e7c82fa6148a58a55545066cd790a
SHA25688288feafa54cca23e3f95456f14ddc4efed7553c51cf8f48c4c92e535c25869
SHA512fed439e3180b2e29c8eacf751f586c582f26ead6db1a501fd31cd2c60ca605b5c5fb190eec8496479ee638452a8e8ee4d4ae226f0c3fc0ee07fb534301543c30