Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
Defender_Update_Setup_778795.exe
Resource
win7-20240903-en
General
-
Target
Defender_Update_Setup_778795.exe
-
Size
4.5MB
-
MD5
c9baa2a4a6391e1da55f0183ea74e7a4
-
SHA1
d1515aa4508d7eaf99ff868dabbee2aa20d9ba5a
-
SHA256
3be2acb935f988318b4743621a6bea99d55d51497a0834ceef484901382916b6
-
SHA512
b004bf343636f7fc313ee8c0f204002fc0dbcee61ddc46263275e4076c0c766d4a1cd4867cc7043c7c595023e56bf539b6648c83609ab1cb111f0d5fdf51cec9
-
SSDEEP
98304:DwREt0WHawX9sYuirFIuoR7p7C14/Mxob+bA3JbmyCO/l4z:5tao2uG9C1SMxZimyCO4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2724 Defender_Update_Setup_778795.tmp 2612 Defender_Update_Setup_778795.tmp -
Loads dropped DLL 4 IoCs
pid Process 2176 Defender_Update_Setup_778795.exe 2724 Defender_Update_Setup_778795.tmp 2700 Defender_Update_Setup_778795.exe 2612 Defender_Update_Setup_778795.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender_Update_Setup_778795.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender_Update_Setup_778795.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender_Update_Setup_778795.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender_Update_Setup_778795.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2176 wrote to memory of 2724 2176 Defender_Update_Setup_778795.exe 30 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2724 wrote to memory of 2700 2724 Defender_Update_Setup_778795.tmp 31 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32 PID 2700 wrote to memory of 2612 2700 Defender_Update_Setup_778795.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Defender_Update_Setup_778795.exe"C:\Users\Admin\AppData\Local\Temp\Defender_Update_Setup_778795.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\is-M6N6P.tmp\Defender_Update_Setup_778795.tmp"C:\Users\Admin\AppData\Local\Temp\is-M6N6P.tmp\Defender_Update_Setup_778795.tmp" /SL5="$30144,3764700,857088,C:\Users\Admin\AppData\Local\Temp\Defender_Update_Setup_778795.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Defender_Update_Setup_778795.exe"C:\Users\Admin\AppData\Local\Temp\Defender_Update_Setup_778795.exe" /VERYSILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\is-P8DRI.tmp\Defender_Update_Setup_778795.tmp"C:\Users\Admin\AppData\Local\Temp\is-P8DRI.tmp\Defender_Update_Setup_778795.tmp" /SL5="$40144,3764700,857088,C:\Users\Admin\AppData\Local\Temp\Defender_Update_Setup_778795.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59cf66b9ba3daaccb510ce72604db4203
SHA1c1a5b9aa6b0c61857000e4f5e519f40eae4f1ba8
SHA25610fa4f46acd467ff5ecf3c19acb0663f275fec8334259c8236a325c8124ea6ad
SHA5127c7bc0be1fa7d08862c4f83e2200111f6209052886e511fe41ae7f60b0e4557cc72e79c6b82aa50ba714366d9ef2ef981b5e4478bbadb2e308cc49839d63a6dc
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547