Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe
Resource
win10v2004-20240802-en
General
-
Target
3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe
-
Size
201KB
-
MD5
dd0cf90550045d42ace823f8e773ee50
-
SHA1
90f5c745503cce184a04c95aa07762fb9e42564e
-
SHA256
3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780
-
SHA512
69be238be187b3116c9d2f9adf6d5e3659bdcbbd3d10393e5b538ebbce7b8e432721c5577aad3f36d5a1ced905983fd365063beb512d4afa73d9f39fe26919cc
-
SSDEEP
3072:Bih0fMFfugUVg+/to3AbyaTzEfKi9Rv2PNpWJJpO3+KwIZxoUVVZWKbLqvTb+:0h0fUWgUVBWwWOErvEeof5ZzVeKPaTb+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2776 emlssch.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\emlssch.exe 3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe File created C:\PROGRA~3\Mozilla\hsimtwa.dll emlssch.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emlssch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2232 3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe 2776 emlssch.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2776 2272 taskeng.exe 32 PID 2272 wrote to memory of 2776 2272 taskeng.exe 32 PID 2272 wrote to memory of 2776 2272 taskeng.exe 32 PID 2272 wrote to memory of 2776 2272 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe"C:\Users\Admin\AppData\Local\Temp\3c5fbe7807dfb60a0acdafda5dd3ffd12895e1615981a7714d98e37dfcf15780N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2232
-
C:\Windows\system32\taskeng.exetaskeng.exe {DA42977E-BC63-4816-9F76-280C13B7D194} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\PROGRA~3\Mozilla\emlssch.exeC:\PROGRA~3\Mozilla\emlssch.exe -jioalan2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD56fe1a4220de975322867a2b5753288f5
SHA1cd5bd74429092ee4e6f5c0a9af08f3b5c2ebb8e5
SHA2567c1b06a29961a63523a08d0f4d70711645dd5f36f306621a962c00f375f48a4a
SHA512d31f7a97dacb1c1b9956cfc91a85915581d884f27b188a92ad22a01cbde1dc803679c23ab49aec431a063066e1ec56140bff68f95fb92921eeef632ed292cd73