Analysis
-
max time kernel
120s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe
Resource
win10v2004-20240802-en
General
-
Target
cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe
-
Size
403KB
-
MD5
eef629f6c9074d496ce9b18fe9273670
-
SHA1
39c9af6f31d1d5c69da0f5bb09f76913b9942200
-
SHA256
cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31
-
SHA512
31a0990182c81119eef9a0a53f014ce19229fad09b10d02a362a1d1c2a530f979a400b293c0cb388dd75e8926aee416b2b4c72fc3914e6d2bc31ffab9c61b4e9
-
SSDEEP
12288:T5WI0T5+OR6CnvQ9hHhoQUXJ6WtDBrHhh2:lpa5VRDvQ/NUXJLzbhh2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2880 iJ01833NbClK01833.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 iJ01833NbClK01833.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iJ01833NbClK01833 = "C:\\ProgramData\\iJ01833NbClK01833\\iJ01833NbClK01833.exe" iJ01833NbClK01833.exe -
resource yara_rule behavioral1/memory/2072-1-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/2072-18-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/2880-22-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/2880-29-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral1/memory/2880-38-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iJ01833NbClK01833.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iJ01833NbClK01833.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe Token: SeDebugPrivilege 2880 iJ01833NbClK01833.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 iJ01833NbClK01833.exe 2880 iJ01833NbClK01833.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2880 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe 30 PID 2072 wrote to memory of 2880 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe 30 PID 2072 wrote to memory of 2880 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe 30 PID 2072 wrote to memory of 2880 2072 cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe"C:\Users\Admin\AppData\Local\Temp\cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\ProgramData\iJ01833NbClK01833\iJ01833NbClK01833.exe"C:\ProgramData\iJ01833NbClK01833\iJ01833NbClK01833.exe" "C:\Users\Admin\AppData\Local\Temp\cbac964d23a736f5432428e14610e732b084938accbb61f5bd394015808b4b31N.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD5052c612dd19702c176457bdad7dd6feb
SHA1f4e899ca68f78520209652473919397bbda56380
SHA2562d331a66b0a53bb36d26087bc2a15d57351249927978a439b3faa21ee15279f8
SHA51294418168ecff89392576e701ee1c166220b850d126f87a4794dabe2a8a8105987c728567400857e9e92b340f5759a22725b80f7f2b690f4215987fae8e63f46d