Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe
Resource
win10v2004-20240802-en
General
-
Target
ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe
-
Size
225KB
-
MD5
81e130d3b029e1c0a6c3e19ac5dedf48
-
SHA1
01424059a434bffa1e048dcea443f27018da3076
-
SHA256
ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a
-
SHA512
9be8556bde4e0fd274958be5a4ccee67d14dfea8307c54d184ca6c4ce4936f1d3789836e6e00773c5f56f65279441562d9a76ce03dd8cf0c5dded7236cfd6659
-
SSDEEP
6144:0A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:0ATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\8C20A710 = "C:\\Users\\Admin\\AppData\\Roaming\\8C20A710\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe 2744 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2744 2412 ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe 30 PID 2412 wrote to memory of 2744 2412 ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe 30 PID 2412 wrote to memory of 2744 2412 ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe 30 PID 2412 wrote to memory of 2744 2412 ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe 30 PID 2412 wrote to memory of 2744 2412 ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe 30 PID 2744 wrote to memory of 1180 2744 winver.exe 21 PID 2744 wrote to memory of 1052 2744 winver.exe 18 PID 2744 wrote to memory of 1160 2744 winver.exe 20 PID 2744 wrote to memory of 1180 2744 winver.exe 21 PID 2744 wrote to memory of 1468 2744 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1052
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe"C:\Users\Admin\AppData\Local\Temp\ea68617f0ce18491dee0783f1c91da8f77555013b1496e5ff71ad6ab7759534a.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2744
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1468