Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe
Resource
win7-20240903-en
General
-
Target
72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe
-
Size
909KB
-
MD5
5e55a47b6d7053f9d1ff19539863b8c2
-
SHA1
0fc816248d3ee7605237b1c216dd95333f9edc44
-
SHA256
72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545
-
SHA512
53665b9d764a454aa5ed9f0037a4c36df169ee0fa2caf328b7b559c97006f8818cb33cdeb488333e37c266be041b8fcd4dc4aa683e69472d9c0e00850ad1807d
-
SSDEEP
12288:ECXVJY0G8ReIqcEV/cjrk/BO27mOCNcnjaEpEEt/xOJUnjz/j/aP3hLnqZ:Eys07eFv1/4PwG/C5OKnjz/zwlnqZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 Sleeping.pif -
Loads dropped DLL 1 IoCs
pid Process 1740 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1368 tasklist.exe 2644 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\HeatherUnable 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe File opened for modification C:\Windows\AsusNorfolk 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe File opened for modification C:\Windows\LegacyAwful 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleeping.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2700 Sleeping.pif -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2700 Sleeping.pif 2700 Sleeping.pif 2700 Sleeping.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1368 tasklist.exe Token: SeDebugPrivilege 2644 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2700 Sleeping.pif 2700 Sleeping.pif 2700 Sleeping.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2700 Sleeping.pif 2700 Sleeping.pif 2700 Sleeping.pif -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1740 2276 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe 31 PID 2276 wrote to memory of 1740 2276 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe 31 PID 2276 wrote to memory of 1740 2276 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe 31 PID 2276 wrote to memory of 1740 2276 72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe 31 PID 1740 wrote to memory of 1368 1740 cmd.exe 33 PID 1740 wrote to memory of 1368 1740 cmd.exe 33 PID 1740 wrote to memory of 1368 1740 cmd.exe 33 PID 1740 wrote to memory of 1368 1740 cmd.exe 33 PID 1740 wrote to memory of 1708 1740 cmd.exe 34 PID 1740 wrote to memory of 1708 1740 cmd.exe 34 PID 1740 wrote to memory of 1708 1740 cmd.exe 34 PID 1740 wrote to memory of 1708 1740 cmd.exe 34 PID 1740 wrote to memory of 2644 1740 cmd.exe 36 PID 1740 wrote to memory of 2644 1740 cmd.exe 36 PID 1740 wrote to memory of 2644 1740 cmd.exe 36 PID 1740 wrote to memory of 2644 1740 cmd.exe 36 PID 1740 wrote to memory of 2736 1740 cmd.exe 37 PID 1740 wrote to memory of 2736 1740 cmd.exe 37 PID 1740 wrote to memory of 2736 1740 cmd.exe 37 PID 1740 wrote to memory of 2736 1740 cmd.exe 37 PID 1740 wrote to memory of 2764 1740 cmd.exe 38 PID 1740 wrote to memory of 2764 1740 cmd.exe 38 PID 1740 wrote to memory of 2764 1740 cmd.exe 38 PID 1740 wrote to memory of 2764 1740 cmd.exe 38 PID 1740 wrote to memory of 2740 1740 cmd.exe 39 PID 1740 wrote to memory of 2740 1740 cmd.exe 39 PID 1740 wrote to memory of 2740 1740 cmd.exe 39 PID 1740 wrote to memory of 2740 1740 cmd.exe 39 PID 1740 wrote to memory of 2548 1740 cmd.exe 40 PID 1740 wrote to memory of 2548 1740 cmd.exe 40 PID 1740 wrote to memory of 2548 1740 cmd.exe 40 PID 1740 wrote to memory of 2548 1740 cmd.exe 40 PID 1740 wrote to memory of 2700 1740 cmd.exe 41 PID 1740 wrote to memory of 2700 1740 cmd.exe 41 PID 1740 wrote to memory of 2700 1740 cmd.exe 41 PID 1740 wrote to memory of 2700 1740 cmd.exe 41 PID 1740 wrote to memory of 2824 1740 cmd.exe 42 PID 1740 wrote to memory of 2824 1740 cmd.exe 42 PID 1740 wrote to memory of 2824 1740 cmd.exe 42 PID 1740 wrote to memory of 2824 1740 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe"C:\Users\Admin\AppData\Local\Temp\72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Extends Extends.bat & Extends.bat2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"3⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3766153⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PieAttachedEndlessEz" Projected3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Presence + ..\Expenditures + ..\Settlement + ..\Daniel + ..\Javascript + ..\Packs y3⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\376615\Sleeping.pifSleeping.pif y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2700
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
426KB
MD5ae3d55e50e851e400c6276ea49e81e4f
SHA12447dd509e112be9d80520bcba5a0511320baaf7
SHA256f64f9dfc4fce3514662636891549ab28f2314d5b5c50a12c2dcc0282cd052a8b
SHA5122bb77a8b0a1e277839efe16de88852b1a23079de38ca47f4d562c11f9eb9931f4a733155137aa223b2e0c8665fd934bf52bfae700de6ca9ebc663f3aa7a46812
-
Filesize
94KB
MD5dbb5b61f1db614c25d7ec9d101110a59
SHA1baf31207e205d36645a0eff19e87c74be1b576ea
SHA2563eb6724e3f69973f4df7a5026da55fcbe1b48b9ae0661ff79e454cde052d2381
SHA512016e72fe2e3f68246e5e40e4f39e25a4ffa6ebf76d451bc71b0136768104f36a40d377456d9f5a8d5a4b49bc927e085a5677cbb1c7f67f27855b8d7c4e4948db
-
Filesize
86KB
MD549f0222027ce9239edfe22653b2cabd4
SHA1c8326622726f76cdaf79a47fadc9eb5beac32237
SHA256b9921b700b9725b83e0c59c33bc14af9cc1c16a15fc5c6794fbb0225187b93ec
SHA5125c4c92304713f4cbc3f08214c5b12bc056c5694c1893d6e916c6cb069e176740ca3b0dbc67b507c45e7119cb9eb26668c923dc138ec1f4a1e6e1d603bb2d343e
-
Filesize
8KB
MD51d84284b8942f58060e1d05f0b1e188a
SHA1b67d7f48760822e8af325f78d897e2d915de565c
SHA256352e14e0acd212b3152ce18c1145028da38a7fbedf5cf736995e806f2388a113
SHA5121de99eda612855e4303caa5fef13917081bcfa3bd6c7bbb363000dd0a8a19f98c15cdab9b8a8d5b86915b632589a831d4578b82ace71f0443792cc6e899d182a
-
Filesize
866KB
MD547f486f9a09c3c92d6c63df8a59e4964
SHA10b83d8336e74a094c9e4a85df296dcb3ef8f0a02
SHA25649038116a1180b904492a7df13f7f37803f192e9f778c01e83d0378c5b842437
SHA512f8c05cbf2a95d1fc86d78ff58abe4d2c1ff9d296815f44c9db89225f87043e34553a0d1062f9f2e89910957c13b2fe4766ad80769a1e746949ac16d85917dd58
-
Filesize
60KB
MD5e74399d04f69a683d98046ab88f5bba0
SHA1c88af22c8c29c3405ea385fa6c792e490a12aec8
SHA256961d4241d2a91eea86a27a5c746f65bce321b2bdca8048ae775a713a7cbc3ed6
SHA51223074aeb05050c89ba14d30c99b580bc929745eaca718f937c3d7666a8165efb55f55b05257002035bd2f17b6de8b51355d2f4025996f0a81dc2d8b3c91359ee
-
Filesize
38KB
MD55cbc78e7462b03104122bfcea6c0570f
SHA14b9f078f630e2f5530f247ea3e194e7b3877056b
SHA25675f7b16d57b7956bb74e3640c616f432b773951855297743c90b735284a74165
SHA512e6d0a80386fc4eb77c073fa1d0c6f49b36fe216276b64dd90c24de1ec77703cd0db6f4a586063579255d79cd85ef5e1a39578d48c3ca4023dc17e6701da5aa93
-
Filesize
60KB
MD5ee2ef75583f3d5eabc9de0aeeb588752
SHA1072fbac659a8878a5ed39b8710ced7256d0a8b31
SHA2563fc3907a25dea94f2848f8431111f1270a033277212fadff68cb1541dc7abb22
SHA5127fa97e919747ce1bdf94012089ef50e2fa3b3b167b072f6deccb966009c4a94d37c60e89b6e1592593d0bcb6196cb9d781a370e727815bce1246d642278e49d9
-
Filesize
6KB
MD593e1c03496c73ce0227eebfe83b0bd3d
SHA1e571d6fdee00475b54029a6af43ab1341abac5dc
SHA256f36376d6c3ca12b169ec967ac62ffab30840073edb1d6f6128dfd294753a1444
SHA51220a24d9bf4aaa49f9ffcf6774678aef655b924c93dc42d5520bc312dbb8023ef90747e12ab0436f8e61a754abfd840bbf854a061d90d395f8a422200649a5c4b
-
Filesize
88KB
MD57c56f2bf9a311376e68263ee9c5a8393
SHA1797bd5804a7a3f9425e23f9caf70aa473a46adaf
SHA256fdbafb85b95cd634ec53a63e29e0a2d34704ed22e356907961a5eb9e7d056e1a
SHA5122b0fdb236c7ec2434ccc3d9036dd80a37e8d3bf433d241809e9f869f6a8731955787230da22a1ed200677ecdceb65b40cca57dfb2c3f74ff68d3640bbbb729b5