Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe
Resource
win10v2004-20240802-en
General
-
Target
89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe
-
Size
39KB
-
MD5
12ff172401d1cdd16fa903efd04126e0
-
SHA1
a86e56b1686c27ffb4a0647166fe36e5e8ef70c7
-
SHA256
89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823
-
SHA512
364dbeadec91d2bc3dd9202a3a1531348190aaa3509e42af206703d527c22968ecb39ef869a99b46ca242a43e2a4a3da2e663b24b1a0435b6a0cac0da2ec6547
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRC:bc/y2lkF0+BL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2104 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 1860 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rewok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1860 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe 2104 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2104 1860 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe 30 PID 1860 wrote to memory of 2104 1860 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe 30 PID 1860 wrote to memory of 2104 1860 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe 30 PID 1860 wrote to memory of 2104 1860 89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe"C:\Users\Admin\AppData\Local\Temp\89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD55df917b69c24d47a611e3b65acc9dc28
SHA1f456f5348a8470f030a3fac0a5d8e72f161c36a3
SHA2566a3768b042ae1dc574a997388706d6bdae72af3c2ccf1ab6a4f07417cd789767
SHA512cdec25697eb43cfaaf943d86a3e7b4530bec90b53d476d3de7251628e6a1f9a4fc62c1a6cfd4456d30f5f382168e80bb68a997e898061ee4528284ead806c357