Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/09/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe
Resource
win10v2004-20240802-en
General
-
Target
bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe
-
Size
237KB
-
MD5
782fe3f6ebba922c31b53aa33f4d8980
-
SHA1
1b1f33c05c916e6b45af23f96ac540dcf40b939d
-
SHA256
bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2
-
SHA512
a8c6aaecf66094661153e8f61aa36daf563e8b77e679b2301765912037c61c1a6e93ed6b001a12705b3f546efc3005505db74105a274b7a5e9ae4c27a43fbfef
-
SSDEEP
6144:2A2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYQ:2ATuTAnKGwUAWVycQqgj
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\8F6F7756 = "C:\\Users\\Admin\\AppData\\Roaming\\8F6F7756\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe 2660 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2660 winver.exe 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2660 2916 bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe 30 PID 2916 wrote to memory of 2660 2916 bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe 30 PID 2916 wrote to memory of 2660 2916 bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe 30 PID 2916 wrote to memory of 2660 2916 bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe 30 PID 2916 wrote to memory of 2660 2916 bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe 30 PID 2660 wrote to memory of 1192 2660 winver.exe 21 PID 2660 wrote to memory of 1100 2660 winver.exe 19 PID 2660 wrote to memory of 1164 2660 winver.exe 20 PID 2660 wrote to memory of 1192 2660 winver.exe 21 PID 2660 wrote to memory of 1612 2660 winver.exe 25 PID 2660 wrote to memory of 2916 2660 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe"C:\Users\Admin\AppData\Local\Temp\bfb29356c5d85dd674bf84afc62daddd7749d1dc9c058e655aaca0b9d23bb0d2N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1612