Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
3035773a6fd96df3c95f7b3c966cc204.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3035773a6fd96df3c95f7b3c966cc204.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
3035773a6fd96df3c95f7b3c966cc204.exe
-
Size
431KB
-
MD5
3035773a6fd96df3c95f7b3c966cc204
-
SHA1
8edaa8a7551b35e08e4ba8574a29440023813e85
-
SHA256
3651fbb3c17ca4bc7590476dad23c1fbd773bc3595313d87ac23eff91c203586
-
SHA512
1fbb1e59e9999bed11f15dace727c745fa788f0d26cf887b924670eead5b1ece5a6ed9c8702f0d83c71734fefd95893bf06fbdb3cb6b52e777ca4ae2c7fa40e7
-
SSDEEP
12288:AgGlyn9K5Fy1sDLwdr0jD2O7yvZ4Gl1Wb6:AgEUc58sfPjdGuUWb6
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2672 3035773a6fd96df3c95f7b3c966cc204.exe 2672 3035773a6fd96df3c95f7b3c966cc204.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\leiotrichine.cra 3035773a6fd96df3c95f7b3c966cc204.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\unneutralize.Exe 3035773a6fd96df3c95f7b3c966cc204.exe File opened for modification C:\Program Files (x86)\Common Files\Indhak.non 3035773a6fd96df3c95f7b3c966cc204.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\inspicalr\casimeres.ini 3035773a6fd96df3c95f7b3c966cc204.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2756 2672 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3035773a6fd96df3c95f7b3c966cc204.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2756 2672 3035773a6fd96df3c95f7b3c966cc204.exe 30 PID 2672 wrote to memory of 2756 2672 3035773a6fd96df3c95f7b3c966cc204.exe 30 PID 2672 wrote to memory of 2756 2672 3035773a6fd96df3c95f7b3c966cc204.exe 30 PID 2672 wrote to memory of 2756 2672 3035773a6fd96df3c95f7b3c966cc204.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3035773a6fd96df3c95f7b3c966cc204.exe"C:\Users\Admin\AppData\Local\Temp\3035773a6fd96df3c95f7b3c966cc204.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 5322⤵
- Program crash
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472