Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe
Resource
win10v2004-20240802-en
General
-
Target
ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe
-
Size
12KB
-
MD5
803157ab3b91855f750141c26f831b20
-
SHA1
7db52bfb9cc76a429318be112c665f860c08a7e2
-
SHA256
ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069fe
-
SHA512
6d95aebd7344b5a0a369cfa9c06a03fcb245def4298d11dd2b48000be14e23832e0830d8a9498801646fcee3da0c0c0ba8c9c31a7841f98e7dd7ba0a350f4e35
-
SSDEEP
192:AMHk6FtYS7qyGZ0CKYqRgazb2PAYzNo67G:rtYS2yGAZ6PAYzNo2G
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WihdowsUpdate = "C:\\Windows\\system32\\WindowsUpdt.exe" ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsUpdt.exe ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdt.exe ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe"C:\Users\Admin\AppData\Local\Temp\ba7cd0cf3b588c408abf3259a318e2a6094438ecb6f9063b8d41e05b0e0069feN.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2496