Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 18:20
Behavioral task
behavioral1
Sample
045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe
Resource
win7-20240903-en
General
-
Target
045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe
-
Size
6.0MB
-
MD5
0a5a59317a24027a56e4e99f1b5b8339
-
SHA1
efd28719560834e1138474c4837f990155deb038
-
SHA256
045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137
-
SHA512
5f19807ab5ffb246adf163100289aaf4ed5b83997600e760395288beaeed42830a0ad8c801212a3e3ab07ae93873bc0cbb3ae18687dd87c609493ccc3d1ac3b3
-
SSDEEP
98304:WYibt2oZWcakLv02IrBLcakD80vaNUllS8mwWcakLv02IrBLcakY/qSs2XhzXMGA:J5KWdrZJdeaicwWdrZJdSshzXMGxdrZO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000d00000001227f-11.dat upx behavioral1/memory/3064-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2380-16-0x0000000023AE0000-0x0000000023D3C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 484 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3064 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 32 PID 2380 wrote to memory of 3064 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 32 PID 2380 wrote to memory of 3064 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 32 PID 2380 wrote to memory of 3064 2380 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 32 PID 3064 wrote to memory of 484 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 33 PID 3064 wrote to memory of 484 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 33 PID 3064 wrote to memory of 484 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 33 PID 3064 wrote to memory of 484 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 33 PID 3064 wrote to memory of 2804 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 35 PID 3064 wrote to memory of 2804 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 35 PID 3064 wrote to memory of 2804 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 35 PID 3064 wrote to memory of 2804 3064 045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe 35 PID 2804 wrote to memory of 2836 2804 cmd.exe 37 PID 2804 wrote to memory of 2836 2804 cmd.exe 37 PID 2804 wrote to memory of 2836 2804 cmd.exe 37 PID 2804 wrote to memory of 2836 2804 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe"C:\Users\Admin\AppData\Local\Temp\045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exeC:\Users\Admin\AppData\Local\Temp\045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe" /TN kCYNNCHn7c55 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:484
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN kCYNNCHn7c55 > C:\Users\Admin\AppData\Local\Temp\bfk51Gnn.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN kCYNNCHn7c554⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee10dbc9b022f4b419820e627aebca28
SHA1906cefd8c677fda6c0dbd1cf2032644b685baa7b
SHA256f14c3b7eb3112419cf76c681183520b30cca5278b586793b62e2b42e02021b6f
SHA512f5db765d94582aa2d0262fc049517364e8ad45be9a7055207fd25ae92466ce63fdb86df8e466348420580df55911bb4c05ba839b21fcd4506cdf8e5fa3d0446b
-
\Users\Admin\AppData\Local\Temp\045dd07fe37d8b7cdd532bed01d703a8e7e791551f1fc94efe0acc838af87137.exe
Filesize6.0MB
MD54e9422d974e6e0a056b132be5957ef45
SHA147901e6d4663319bca4e02b0f18d61a4313aa012
SHA25624221abc023041bc19031289419947297ad8f150edb06b79c1741018db492714
SHA512c544e4fc928009b64c44eed11e61ff6c2d742c5e2210a37e761a4c48156872d58c3b683852c41db1d2ef71a36fe1a311438b56f57af6e6873631f8dc68d1e347