Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe
Resource
win10v2004-20240802-en
General
-
Target
e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe
-
Size
43KB
-
MD5
3326a87faeb8c2087f4988d390e5b230
-
SHA1
878a77cc2b96627ac2a4b4a31d6a80b35ba4454c
-
SHA256
e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578b
-
SHA512
28c353e6fd1b7656d7ea5c0b0a42bcf14952b390403884539b126d96d65b85c560b5e38bdf0b3365c1c3983d36123a782744d0b6fc61995070f634f6d2102583
-
SSDEEP
768:swg9aYfQkXdmCdMimsENm4QctL4yM2F4hUmQe:sR0QQwndcsE0vSMXzQe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 hhcbrnaff.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhcbrnaff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2796 2192 e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe 30 PID 2192 wrote to memory of 2796 2192 e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe 30 PID 2192 wrote to memory of 2796 2192 e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe 30 PID 2192 wrote to memory of 2796 2192 e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe"C:\Users\Admin\AppData\Local\Temp\e7fb2b7e714f4bc6245ae6ded64c74294e819a3569247a2e361d07ed310a578bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD50f43adaeafcca931791cb9ad5601d8fe
SHA10dfd74ad160bf7c60e186db6d7aa6eaeaa156c8c
SHA25602aa6bf664df4d1d36d3e5a57fb76832e09fc21194154c31e8b5bd8794e2d6f6
SHA512db879f5379c12b8e30b6f64f2da1ad3879df1a2db5d5ccc1b5ab29015cc24bddb70c4185848d057e49aa049378d1908ae54f38d6962183c1055f1d8e01d81a3f