Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 19:39
Behavioral task
behavioral1
Sample
c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe
Resource
win7-20240903-en
General
-
Target
c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe
-
Size
9.1MB
-
MD5
9e75c8d731ee3a6dd9a83209044f2cad
-
SHA1
eec3655f162fa2202eca56041631943d3de1c006
-
SHA256
c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5
-
SHA512
faa51b04fd9cc39af2a79ed6ea08d7370a873858b4dea9553258acb31d2bb56abdeaf51a53428b3a616c2ca42776c849482ad711ffa9ff1958cf1698d1117444
-
SSDEEP
196608:1by4htFEGGC0sxRNw+4DAT1sfGpmpZyZkpUvWkg+6yrjvfdS9+5Tq3YsF8:1by4hnE5C0Ua+4Dy1XWru7gsfVruNF8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe -
Loads dropped DLL 2 IoCs
pid Process 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe -
resource yara_rule behavioral1/memory/1892-0-0x0000000000400000-0x0000000000D48000-memory.dmp upx behavioral1/files/0x0008000000015d75-5.dat upx behavioral1/memory/2580-9-0x0000000000400000-0x0000000000D48000-memory.dmp upx behavioral1/memory/1892-11-0x0000000000400000-0x0000000000D48000-memory.dmp upx behavioral1/memory/2580-14-0x0000000000400000-0x0000000000D48000-memory.dmp upx behavioral1/memory/2580-21-0x0000000000400000-0x0000000000D48000-memory.dmp upx behavioral1/memory/2580-25-0x0000000000400000-0x0000000000D48000-memory.dmp upx behavioral1/memory/2580-27-0x0000000000400000-0x0000000000D48000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\Z: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\A: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\B: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\E: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\M: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\N: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\S: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\V: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\I: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\K: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\L: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\O: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\R: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\U: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\G: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\H: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\J: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\P: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\Q: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\W: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\X: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe File opened (read-only) \??\Y: c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 2580 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2580 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 30 PID 1892 wrote to memory of 2580 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 30 PID 1892 wrote to memory of 2580 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 30 PID 1892 wrote to memory of 2580 1892 c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe"C:\Users\Admin\AppData\Local\Temp\c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Ѫɷ¹¥ËÙ΢¶Ë\c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exeC:\Ѫɷ¹¥ËÙ΢¶Ë\c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5300ce7bc3bbd7d89076570731cde8ed5
SHA11deb0542437947901c5bb7d2724102661df60374
SHA2562870f0bd2f17f804ef348e6fef15cad9f4b11710aee31db5c06c9ea1411c79bc
SHA512a7b55d7ba45dcebf9e562c66a2dd8b4cb3904029a6b807425d95c4e6f2d2780ce6dd20dbd1dff6ad1fc25cb5d4ea790311406b32ab1ee0ff05a06812a6452dd6
-
Filesize
9.1MB
MD59e75c8d731ee3a6dd9a83209044f2cad
SHA1eec3655f162fa2202eca56041631943d3de1c006
SHA256c1f12dc3c0fb09f65783075b08c530090e19a143b545d1b4b06ce2a17e9021d5
SHA512faa51b04fd9cc39af2a79ed6ea08d7370a873858b4dea9553258acb31d2bb56abdeaf51a53428b3a616c2ca42776c849482ad711ffa9ff1958cf1698d1117444