Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 08:35
Behavioral task
behavioral1
Sample
47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe
Resource
win7-20240708-en
General
-
Target
47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe
-
Size
2.8MB
-
MD5
3b2b45fc92ff48933137dd93f9ca1340
-
SHA1
602883deb2269a9c07c707e2f65c3d28da764310
-
SHA256
47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2f
-
SHA512
fd8fcae7b2f7872d71b53d7b9232c74b3bf1d5a4c0a2cae3ef4b46d64a6445d64f5b2a3c8c2643aca094087bde91c9f1d78b580710292bb56ff8b3c45f8f10f0
-
SSDEEP
49152:XoarXH1/0fEWdHJEuMlSVj2BY2b+wKSp8lmQnqyHJEuMlSVj2636rT8lxre+wNJZ:YcXH18fEWdHJEu9Vj2BY2ZKS6lHqyHJA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe -
Loads dropped DLL 1 IoCs
pid Process 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
resource yara_rule behavioral1/memory/1288-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012286-16.dat upx behavioral1/memory/2140-17-0x0000000000400000-0x000000000065C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2140 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 29 PID 1288 wrote to memory of 2140 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 29 PID 1288 wrote to memory of 2140 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 29 PID 1288 wrote to memory of 2140 1288 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 29 PID 2140 wrote to memory of 2992 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 30 PID 2140 wrote to memory of 2992 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 30 PID 2140 wrote to memory of 2992 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 30 PID 2140 wrote to memory of 2992 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 30 PID 2140 wrote to memory of 2812 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 32 PID 2140 wrote to memory of 2812 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 32 PID 2140 wrote to memory of 2812 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 32 PID 2140 wrote to memory of 2812 2140 47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe 32 PID 2812 wrote to memory of 1536 2812 cmd.exe 34 PID 2812 wrote to memory of 1536 2812 cmd.exe 34 PID 2812 wrote to memory of 1536 2812 cmd.exe 34 PID 2812 wrote to memory of 1536 2812 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe"C:\Users\Admin\AppData\Local\Temp\47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exeC:\Users\Admin\AppData\Local\Temp\47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe" /TN hqygtkpk52a3 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN hqygtkpk52a3 > C:\Users\Admin\AppData\Local\Temp\TRWpWA.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN hqygtkpk52a34⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\47844e557aae02b0e21452d42be84573caeac9165ea071693cd6d289b70b6e2fN.exe
Filesize2.8MB
MD5fbe6e1da06c048ceeb18d937901c6d6a
SHA1b5f3810aa125366d027157ca6e48891fc6b64c9a
SHA2564caff5af2a9d24f4198aa2ed350d600f17552ce8f3df32749bb0c885385638b7
SHA51215a4e80ee883f614636b6c7f7939e08a63424aaae2b5e9fef8850ae52a460f28cfea78cc1c05b8cc8ca5a42a3fe6cf4dc6583177b7ec88877b862d726b06e42a
-
Filesize
1KB
MD55f6efa0ecd7730b7602aef94c8df29ef
SHA1a643dd8e2eac10cf38f3f3ef6fbf9f0a5d5dcd8a
SHA25699ef09fb79a169ae410190f110b902ffe02686936b96758ee13034da799ba8f0
SHA5122083596b08d5c49cff30168ec7a51dfbbe46d0c5cd3db94fe1814a143fa65c916581594e055279cee4c42e54e993bd191be856b8bf4c8c266a6ab606daa12a65