Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe
Resource
win10v2004-20240802-en
General
-
Target
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe
-
Size
98KB
-
MD5
e93b8f5dc41f87a69fcf19115e985860
-
SHA1
51c55e7ee1d68c26918c1d6e5082dd60f08cde6d
-
SHA256
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2
-
SHA512
787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081
-
SSDEEP
1536:DOoZ86iHPT3qqj7XHLLvXArePDNlv9AEQKzcVsN9+GUROW3zC1hDaMrAJg7Ub+SJ:DdjsnvXtNlebocVsnUROMzC1NAJQO
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe -
Executes dropped EXE 2 IoCs
Processes:
punhs.exepunhs.exepid process 4616 punhs.exe 2336 punhs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\punhs.exe\" /r" ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepunhs.exepunhs.exedescription pid process target process PID 768 set thread context of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 4616 set thread context of 2336 4616 punhs.exe punhs.exe PID 2336 set thread context of 4104 2336 punhs.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4668 4104 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepunhs.exepunhs.execmd.exesvchost.exeab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language punhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language punhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepid process 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exeab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepunhs.exepunhs.exedescription pid process target process PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 768 wrote to memory of 4004 768 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 4004 wrote to memory of 4616 4004 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe punhs.exe PID 4004 wrote to memory of 4616 4004 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe punhs.exe PID 4004 wrote to memory of 4616 4004 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 4616 wrote to memory of 2336 4616 punhs.exe punhs.exe PID 2336 wrote to memory of 4104 2336 punhs.exe svchost.exe PID 2336 wrote to memory of 4104 2336 punhs.exe svchost.exe PID 2336 wrote to memory of 4104 2336 punhs.exe svchost.exe PID 2336 wrote to memory of 4104 2336 punhs.exe svchost.exe PID 2336 wrote to memory of 4104 2336 punhs.exe svchost.exe PID 4004 wrote to memory of 4288 4004 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe PID 4004 wrote to memory of 4288 4004 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe PID 4004 wrote to memory of 4288 4004 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\punhs.exe"C:\Users\Admin\punhs.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\punhs.exe"C:\Users\Admin\punhs.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 3206⤵
- Program crash
PID:4668
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7002.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4104 -ip 41041⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5919f401f1e310780e191647bc128985d
SHA1a91e781971b889d1f625ed8c2a3c7a2effcabca6
SHA2565a0edabc7e792df9004faeda0755e02459beccb031ea07ef8213e2e8b7073953
SHA51276e975ca11f1fdd1e20ccd92fb108dd6219714fdcb06cfdc688514722142a49180eeec8dbae34c1b30757c12b617887153fa5cebef85bcf4addcb9814f11eb1b
-
Filesize
98KB
MD5e93b8f5dc41f87a69fcf19115e985860
SHA151c55e7ee1d68c26918c1d6e5082dd60f08cde6d
SHA256ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2
SHA512787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081