Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe
Resource
win10v2004-20240802-en
General
-
Target
9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe
-
Size
1.1MB
-
MD5
fff64a10529126a8bf2081480d370130
-
SHA1
a5d46ed56c10e8e2e00c563040ab97485188be35
-
SHA256
9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624ac
-
SHA512
e4b6e8e2886b610054622e196faa1c91dffaeaa58ed0d91f1c73172b1dcaa5415ae4137cb1e2ff6309e3e3fea9f8ad646a8759f7e3556d6034e7ddbe7965ab87
-
SSDEEP
24576:80W8HM9IgSFeG4VP47LtOnjhgWHeRHcoZlG4g5wDQLjtBZ:86i0cnlHeRrlG4g5ecjB
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2408 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 30 PID 2420 wrote to memory of 2408 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 30 PID 2420 wrote to memory of 2408 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 30 PID 2420 wrote to memory of 2408 2420 9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe"C:\Users\Admin\AppData\Local\Temp\9ddcabdd1050b8bc1adfe551361bf80cda13028d4fe2db5ec859ffa344a624acN.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD52518580defe2871e87874bc08b954f5e
SHA1ab082bcd2a7c9cdd14fb0559b1fadeb499d33fd1
SHA256483e0681187ae65bd436a63e077749ab8fda164221fa1fd35f94cac6a0107abc
SHA5128b16e6dec8fb2fde165e3210efc80e76a67fa5470d9dc8101b39714e5aa2b2c6de6d54d5d6ce37ec3c21d152d40b1eafa9236548ba629ed92068738c5c4f8b31
-
Filesize
754B
MD5b8e4351fb7b0fea2b66c4b14dfe5a8b7
SHA18ed982a3d7d3fe55944ddbb6aa185b87a8b1fb10
SHA256a1139e67500f8d068bcb00686a01fc1fcd33200ed8c296c53b8a42fbb4456dbf
SHA5120f7852680ad9d807edac730c9412ffd3f4542020a9cd5d08941d3b69d1d8fc427e0027768ff3559915b0f323978f62f23a5d6f6d00995cabc0713e46aa04c2f0
-
Filesize
1.1MB
MD565653eac85855e41cb12cde349e067b3
SHA1159554f74d00ce0a77163f84a0d277c377e90bf0
SHA256d63be5274e014109c93cf7580716e09f8923cfb22637469d54a9592a1cfa6a2d
SHA5120b7c71f8e4eb0e985aa7f66492e5210711e05300c59c8c2a0c2ed79c2450b953d79fbc1bdd953091f91e53480aad4b32968db65372c165a42a163c319a75b3d2