Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe
Resource
win10v2004-20240802-en
General
-
Target
2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe
-
Size
50KB
-
MD5
6f3334d809c5ddc67265e9d12f2ba795
-
SHA1
2e18336b2425afb6807d314afc19d81d4c1257eb
-
SHA256
2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da
-
SHA512
dbedbd63511685563b1a585d61280b76e5a6f5302ad38633c005c783355df47527741e4d341f0d84c0485e54538b2d50c65f8e6c6295311178038f1d10133648
-
SSDEEP
384:EqXJhMCEfgNfxAwMRGnkXF2MTNeUGpPdMYbsd/PwIsyUbSZBAPn2+qvX97yozJ:EsJhM/44Ak12M5ezNG/2rb7vqV7Nd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 wujek.exe -
Loads dropped DLL 2 IoCs
pid Process 2668 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe 2668 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wujek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2340 2668 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe 31 PID 2668 wrote to memory of 2340 2668 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe 31 PID 2668 wrote to memory of 2340 2668 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe 31 PID 2668 wrote to memory of 2340 2668 2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe"C:\Users\Admin\AppData\Local\Temp\2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\wujek.exe"C:\Users\Admin\AppData\Local\Temp\wujek.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5a1b40ba55df4c406c868bcfb9fa2796d
SHA102670e06de5b3b344bcc1a6495ab353eb53d5578
SHA2561e6e996988d45a5ab7ae2564cbaea9800ffbc6f37871bd247ca74c0ea9162711
SHA512e11eef68ad0a22e74ffb365afedc6df3a6d2a652d62ec817c5dae3487a1643b9dd939a0e17ca241e1a15bd8bbe71f1588fda21e268812c6f5105673a6a262980