Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
honst.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
honst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
xxx.vbs
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
xxx.vbs
Resource
win10v2004-20240802-en
General
-
Target
12.exe
-
Size
10KB
-
MD5
a9a91ee1e9e86236182bb4c3964ec7d0
-
SHA1
24c8f69f429115b14bef83e59622daf67d8d2335
-
SHA256
02ef82771cb0b65c5c35c26cd0491a7ebe86afdc96c62c2c69f63f96b395373d
-
SHA512
2a713cf958dc56a6d8638e62ee66256c9ce2c2a247b9174b023b1ef48a5f4cfa8ae8a40cc2b33bd96a462a51ff182ae3ca5d172036711576ce075d8a9b3fb4a3
-
SSDEEP
192:rVNkp+27PqpJkJCmtdwu0BgONC3HUK0WhKvsx3a5c+KGRvS22nj9:rVg7PWJkJh9RON6tKe3aVK0vShj9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 584 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ComRes.dll 12.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2336 12.exe 2336 12.exe 2336 12.exe 2336 12.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2336 12.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 584 2336 12.exe 31 PID 2336 wrote to memory of 584 2336 12.exe 31 PID 2336 wrote to memory of 584 2336 12.exe 31 PID 2336 wrote to memory of 584 2336 12.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\12.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:584
-