Analysis
-
max time kernel
114s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe
Resource
win10v2004-20240802-en
General
-
Target
528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe
-
Size
1.9MB
-
MD5
efe28956830f08d43ef57ee055ef1280
-
SHA1
a4d3ca2a414516fa4358afc0890f9a226aabb3b8
-
SHA256
528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6
-
SHA512
4e40943bd8c68a218c3e90ed71032f049a3fadbc3edbf1f2e1665e98d62c65fef3fef5502f3e70116e21ac9e6516bc7a0d9d77a1c251f5902dcf908578e73205
-
SSDEEP
49152:nP0mqTvU/Dz6hQAEVyLDri/GDgOHhT34o0qrG:cmGqDzRVyLPiWhmD
Malware Config
Extracted
latentbot
yeniceriler.zapto.org
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2620 standard.exe 2764 PATRONUS KOXP V2.5.EXE 2664 RUNDLL.EXE -
Loads dropped DLL 8 IoCs
pid Process 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 2620 standard.exe 2620 standard.exe 2620 standard.exe 2620 standard.exe 2664 RUNDLL.EXE 2764 PATRONUS KOXP V2.5.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll = "\"C:\\Users\\Admin\\AppData\\Roaming\\rundll.exe \"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language standard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PATRONUS KOXP V2.5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNDLL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2532 reg.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 2620 standard.exe 2620 standard.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2764 PATRONUS KOXP V2.5.EXE 2764 PATRONUS KOXP V2.5.EXE 2764 PATRONUS KOXP V2.5.EXE 2664 RUNDLL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2620 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 29 PID 2256 wrote to memory of 2620 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 29 PID 2256 wrote to memory of 2620 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 29 PID 2256 wrote to memory of 2620 2256 528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe 29 PID 2620 wrote to memory of 2764 2620 standard.exe 30 PID 2620 wrote to memory of 2764 2620 standard.exe 30 PID 2620 wrote to memory of 2764 2620 standard.exe 30 PID 2620 wrote to memory of 2764 2620 standard.exe 30 PID 2620 wrote to memory of 2664 2620 standard.exe 31 PID 2620 wrote to memory of 2664 2620 standard.exe 31 PID 2620 wrote to memory of 2664 2620 standard.exe 31 PID 2620 wrote to memory of 2664 2620 standard.exe 31 PID 2664 wrote to memory of 2808 2664 RUNDLL.EXE 32 PID 2664 wrote to memory of 2808 2664 RUNDLL.EXE 32 PID 2664 wrote to memory of 2808 2664 RUNDLL.EXE 32 PID 2664 wrote to memory of 2808 2664 RUNDLL.EXE 32 PID 2808 wrote to memory of 2796 2808 cmd.exe 34 PID 2808 wrote to memory of 2796 2808 cmd.exe 34 PID 2808 wrote to memory of 2796 2808 cmd.exe 34 PID 2808 wrote to memory of 2796 2808 cmd.exe 34 PID 2796 wrote to memory of 2532 2796 cmd.exe 35 PID 2796 wrote to memory of 2532 2796 cmd.exe 35 PID 2796 wrote to memory of 2532 2796 cmd.exe 35 PID 2796 wrote to memory of 2532 2796 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe"C:\Users\Admin\AppData\Local\Temp\528f9b4811ea7be8abb7faa45a54856f0f6d58382524729ec41cba144d1b2bd6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\standard.exeC:\Users\Admin\AppData\Local\Temp\\standard.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\PATRONUS KOXP V2.5.EXE"C:\Users\Admin\AppData\Roaming\PATRONUS KOXP V2.5.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
C:\Users\Admin\AppData\Roaming\RUNDLL.EXE"C:\Users\Admin\AppData\Roaming\RUNDLL.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2532
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD56b8393408a3f2df19ff1e68a4f720729
SHA103cbc980dd47a33bdfa18be80cbd3efdbbaf95c6
SHA256623fecae412449f60ffd8f38862e73504124afb0754952a45103daff0de5a7c9
SHA512235e3c1f0074282c8cd8d6d9b6dc0c71ae591f5ca6a2f2248f832359a1a452cfce26b5f80fddc5acd5aae811630441b640212b9b7a885f2d69e67813d8d846ca
-
Filesize
93KB
MD519fc09ffc7c367c396bd944ac36929e5
SHA109b4b657ca58881a649e16fc5dffe921e4f05056
SHA2562d881e059893bc0bfb41d2a515f4ecca0e372df9048a00c873381eb9ae950852
SHA512d15f9d8099f11611ea117b8302f27362180c4898e1bd52bc026d9a00b5a3010508b5c6fc65fb7dadf20f388c841296703acbd78abe44948ddcd643b530372577
-
Filesize
1.6MB
MD579fdd2bd3d0673dff7fb912d504ebeea
SHA1ceb3de090834500b9aa6dacef10cfe2cba62c44d
SHA256b47648fea36c7550eed009a969ff9d578be201bba9e0c7dbe5b018bcdaa08f6a
SHA512f7ab649a67fc1e7c20bff3b2a4ebb2b332dc36846ca19829d80bb7fd9e97512d9de9901e85e99be0a706bf7ddeae2b90af6018eafea8e309c35657fe729550f2
-
Filesize
344KB
MD50d0b141694c9f13ae53066614b1de6be
SHA1051311856362e56807fde84d48e8b2b3a2e7d306
SHA25657aeb17be53f956b5cc7aa3d07312f853460150b0c3b699daac2e7ca98ad01c6
SHA512bf1a67e0b1d0d575cf56c7a634fdda4c91901d269606173d3bdc1542c2907987eb2b1616a86e770d9aec44ee7986283fb5639ace461aae5a8f6ab3b95fd243f1
-
Filesize
678KB
MD5b4d736875783a1048e6e216d3b2b38c6
SHA11496c92d77fef5a02934bccec920c08ea97f43f7
SHA2561de33c51c314957f3fc1084cbeac14ac6b1552da21b7fd91e604aca00e514b98
SHA512d64d43663330caef3f8a65a37b9ab93b4a662308776faf390f3d1b59e9540572b7f262b04acd3737a90fbe542773ac94e32413058d84024c6c3e388e918a3865