Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe
Resource
win10v2004-20240802-en
General
-
Target
1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe
-
Size
389KB
-
MD5
d20d9d202c340b981989854985589930
-
SHA1
661707f5264c6bb231e7af829bb9fdfb9567bb70
-
SHA256
1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83
-
SHA512
2d7b7c84294ae21ea54f8d92f425ac2244721bb3358d3f3689edfc4adeb3a7c6c5ff8a307d33d053d0ee399e0c32d5344e337315d88ba982fe669c4b27101ab6
-
SSDEEP
6144:5zt17PeiSRnjRqhl/ZvljlR2w/AG0H8guWhIi9fU:5pZPgBl8lZvxix9c
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 a975l5GH0AdQ25.exe -
Executes dropped EXE 2 IoCs
pid Process 1248 a975l5GH0AdQ25.exe 2416 a975l5GH0AdQ25.exe -
Loads dropped DLL 5 IoCs
pid Process 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 1248 a975l5GH0AdQ25.exe 2416 a975l5GH0AdQ25.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\WSQ6pint = "C:\\ProgramData\\7XWOn94vymA0bxZ\\a975l5GH0AdQ25.exe" 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2236 set thread context of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 1248 set thread context of 2416 1248 a975l5GH0AdQ25.exe 32 PID 2416 set thread context of 2012 2416 a975l5GH0AdQ25.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a975l5GH0AdQ25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a975l5GH0AdQ25.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 2236 wrote to memory of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 2236 wrote to memory of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 2236 wrote to memory of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 2236 wrote to memory of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 2236 wrote to memory of 2252 2236 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 30 PID 2252 wrote to memory of 1248 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 31 PID 2252 wrote to memory of 1248 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 31 PID 2252 wrote to memory of 1248 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 31 PID 2252 wrote to memory of 1248 2252 1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe 31 PID 1248 wrote to memory of 2416 1248 a975l5GH0AdQ25.exe 32 PID 1248 wrote to memory of 2416 1248 a975l5GH0AdQ25.exe 32 PID 1248 wrote to memory of 2416 1248 a975l5GH0AdQ25.exe 32 PID 1248 wrote to memory of 2416 1248 a975l5GH0AdQ25.exe 32 PID 1248 wrote to memory of 2416 1248 a975l5GH0AdQ25.exe 32 PID 1248 wrote to memory of 2416 1248 a975l5GH0AdQ25.exe 32 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33 PID 2416 wrote to memory of 2012 2416 a975l5GH0AdQ25.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe"C:\Users\Admin\AppData\Local\Temp\1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe"C:\Users\Admin\AppData\Local\Temp\1e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\ProgramData\7XWOn94vymA0bxZ\a975l5GH0AdQ25.exe"C:\ProgramData\7XWOn94vymA0bxZ\a975l5GH0AdQ25.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\ProgramData\7XWOn94vymA0bxZ\a975l5GH0AdQ25.exe"C:\ProgramData\7XWOn94vymA0bxZ\a975l5GH0AdQ25.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\ieinstal.exe"C:\Program Files (x86)\Internet Explorer\ieinstal.exe" /i:24165⤵PID:2012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD53f30f0ef691be26b6b1c1649f604ce97
SHA187fe2ac07a4bcc86bb6557e3beca15a60136edb8
SHA256f81a80fadab5259af494f7a2ea5d71f63ee1990a745afa07b01cdc08c1b3638d
SHA512dd575ed52699e069f6c4fa394f582bc103d1aa75f366a5bfe9bd5f498ec982e86f99ef0644ca46aa8e168e5a95f09153ddd9639cc79c3fd30d36b1be064eb45d
-
Filesize
389KB
MD5d20d9d202c340b981989854985589930
SHA1661707f5264c6bb231e7af829bb9fdfb9567bb70
SHA2561e66021303620656aeacc14faa7bd8a2e0f554cd57cec192e7e6960c249cca83
SHA5122d7b7c84294ae21ea54f8d92f425ac2244721bb3358d3f3689edfc4adeb3a7c6c5ff8a307d33d053d0ee399e0c32d5344e337315d88ba982fe669c4b27101ab6