Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 05:27
Behavioral task
behavioral1
Sample
9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe
-
Size
110KB
-
MD5
8fb53e1bee5245dc46c66363b8863570
-
SHA1
5c760d9e6dd5396374bebab6b944b8018c26cca8
-
SHA256
9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01
-
SHA512
3f3210566e0be969dabf7ba02bbac1b8355bbb6b6181fea7334ecbac53c9aaf58cd3edbc3a62ff23a694347a297d79118073150003157060ec0edf183353186b
-
SSDEEP
1536:eiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:eiyvRmDLs/ZrwWJjAqGcRJ2hg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\1DD74DD9 = "C:\\Users\\Admin\\AppData\\Roaming\\1DD74DD9\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe 2012 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2012 2084 9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe 32 PID 2084 wrote to memory of 2012 2084 9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe 32 PID 2084 wrote to memory of 2012 2084 9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe 32 PID 2084 wrote to memory of 2012 2084 9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe 32 PID 2084 wrote to memory of 2012 2084 9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe 32 PID 2012 wrote to memory of 1216 2012 winver.exe 21 PID 2012 wrote to memory of 1108 2012 winver.exe 19 PID 2012 wrote to memory of 1176 2012 winver.exe 20 PID 2012 wrote to memory of 1216 2012 winver.exe 21 PID 2012 wrote to memory of 2016 2012 winver.exe 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe"C:\Users\Admin\AppData\Local\Temp\9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2012
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2016