Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe
Resource
win10v2004-20240802-en
General
-
Target
84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe
-
Size
5.3MB
-
MD5
1b22c9dd5fb6ec33ec6ce1a5b2abbae5
-
SHA1
683e746735b6cf1ec365c991a3a057e1af655337
-
SHA256
84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584
-
SHA512
780bed5650f3e1d3abe9f301107a232015aa853c9b113f8ec8221e4861b61c38a308b29a8bb73c97f289eb2f0027b2e650144a658d8ae9fd0dc9b80839d3848c
-
SSDEEP
98304:8fUb/0lYBLg5WhPqgQJXUxefLOZjBQIuRdA6nBjfDtcTT4LnN2R3m+YAT0TPEFAF:8fUmug5Wh9WuefLgQIuocQON2xnSPEFy
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 2776 palemoon.exe 2832 palemoon.exe -
Loads dropped DLL 13 IoCs
pid Process 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 2776 palemoon.exe 2776 palemoon.exe 2776 palemoon.exe 2776 palemoon.exe 2832 palemoon.exe 2832 palemoon.exe 2832 palemoon.exe 2616 cmd.exe 2616 cmd.exe 2648 OracleUninstall_brj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2832 set thread context of 2616 2832 palemoon.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language palemoon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language palemoon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2776 palemoon.exe 2832 palemoon.exe 2832 palemoon.exe 2616 cmd.exe 2616 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2832 palemoon.exe 2616 cmd.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 2372 wrote to memory of 3028 2372 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 31 PID 3028 wrote to memory of 2776 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 32 PID 3028 wrote to memory of 2776 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 32 PID 3028 wrote to memory of 2776 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 32 PID 3028 wrote to memory of 2776 3028 84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe 32 PID 2776 wrote to memory of 2832 2776 palemoon.exe 33 PID 2776 wrote to memory of 2832 2776 palemoon.exe 33 PID 2776 wrote to memory of 2832 2776 palemoon.exe 33 PID 2776 wrote to memory of 2832 2776 palemoon.exe 33 PID 2832 wrote to memory of 2616 2832 palemoon.exe 34 PID 2832 wrote to memory of 2616 2832 palemoon.exe 34 PID 2832 wrote to memory of 2616 2832 palemoon.exe 34 PID 2832 wrote to memory of 2616 2832 palemoon.exe 34 PID 2832 wrote to memory of 2616 2832 palemoon.exe 34 PID 2616 wrote to memory of 2648 2616 cmd.exe 36 PID 2616 wrote to memory of 2648 2616 cmd.exe 36 PID 2616 wrote to memory of 2648 2616 cmd.exe 36 PID 2616 wrote to memory of 2648 2616 cmd.exe 36 PID 2616 wrote to memory of 2648 2616 cmd.exe 36 PID 2616 wrote to memory of 2648 2616 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe"C:\Users\Admin\AppData\Local\Temp\84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\Temp\{B6A8ECB2-A028-47CE-8ABF-A61F298A9389}\.cr\84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe"C:\Windows\Temp\{B6A8ECB2-A028-47CE-8ABF-A61F298A9389}\.cr\84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1882⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Temp\{7A06E8AA-90CE-41A8-86E8-0CEB41EEED3D}\.ba\palemoon.exe"C:\Windows\Temp\{7A06E8AA-90CE-41A8-86E8-0CEB41EEED3D}\.ba\palemoon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Roaming\Exploretask\palemoon.exeC:\Users\Admin\AppData\Roaming\Exploretask\palemoon.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\OracleUninstall_brj.exeC:\Users\Admin\AppData\Local\Temp\OracleUninstall_brj.exe6⤵
- Loads dropped DLL
PID:2648
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5623a65d1efc764b85fea9c976b7d8f6b
SHA1be852d3770a24312cdbfe47a2c08d945b223afb1
SHA25622a97f58ea823b4575a50d4c11616e1121b8da5a995401c6bed6fdf7191b26b3
SHA512797d8ff0104b1632c3360a4bc8903ac1055abad87d6c3acef819fa68ab229c5d50a27dd17aef247793f308b09d1e9518b483febd95b9f6380555d9dfa1d8f94a
-
Filesize
427KB
MD5ff877a5dffd764197250bd4ba28496b1
SHA1187b8e183fc3331dd4ba139333886ad1fbf333a7
SHA25683f935454ae8e450b6f042509ecf28cceff95edb2495c63a782b9d45c2eaf1c0
SHA512b9245353f8a8bce6f443345daf50e135aa9d84bcce4dc5fd9279216b99bc6a1fa409292e110132ad815f303f36006610d6907e9fc778e94977beb2332481d03d
-
Filesize
13KB
MD5740cd68373db32504e9b1b07c37c5ba1
SHA1cad7f83848e7a47cf0b6d81a8e9f700bd9fcbcf5
SHA25671c006fbe80c6b6732f41fdf04c44486e270becd6275ad63ccf6569c6cf357eb
SHA5129e67bff72912da9aade4e5362d7f8e0584f5bd11cc522d013485a1235103bcfb80b069d15618c59591e08f0fe61deba3c473abc4f45af3c29a508a9332374547
-
Filesize
4.0MB
MD501b2a059f5e87c86983e2f8477deb98e
SHA126c29779c5d72ce55bbaf98d398ea45a9eb58430
SHA25674e1cba2742f20ceef66428af0698bd1483c530ac862c2ba702efeb36ad2f352
SHA512869b6b394140daa951c14e262a631a11618112389c7e38ac9ff831375e77262b7ddbde394c0925ea32e9c49a8e46fb0f46b38a50e121a5c21f80b7cebf021500
-
Filesize
2.3MB
MD5967f4470627f823f4d7981e511c9824f
SHA1416501b096df80ddc49f4144c3832cf2cadb9cb2
SHA256b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91
SHA5128883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c
-
Filesize
640KB
MD5ce72a6ce562ae4d949def32bf5196098
SHA196f7e2752b94fea107fb01835b2286e6c2c9e82e
SHA2567c5fa468f8168ec9eba76d33907360348c031777362e7fe214f766582c906d3f
SHA512c13dfd33e44cac6562a3597f1c9a609087408c5f1b848bed789d6656565032ab6683b6535bae3e90c7529af1b24bb2ba1b4515dd4190cfa121df47cc3b37dcd7
-
Filesize
184KB
MD5ac6fe14ba18210a4cff1cb0a8b27e5d7
SHA16b891396563d76b79197b7d0ee236b24b146799b
SHA256b7caa5013e7d4f9520d2c2447ee3c2b14968ec2497115250cc05f6d1b9efa8f6
SHA51294a6a0105eb7ff46d642c171c1b0be491a323eac41149b4e24a1d9964da9d2e4599ec66f22b1e0160009c0bf67421883564e36524ad4a3a88e644ea37f729f43
-
Filesize
275KB
MD5b2d4b1d83945b5787d49a86c4f394e0c
SHA1334a5c434e5d5d0649f8224e449ca9aaf9ba6816
SHA256038d7b257b98421ad371189cf51d67f32ddad2de687c443a59ea74e4027bbf04
SHA5124e92c367991a30d81a718ef26e8e61d24a84d2b54b5d9c6555f319b186ed5bc29d03fb10929bdae4d37c4fe92b3c0be63ee1ed4b287df74af7644e65053222d5
-
Filesize
78KB
MD51e6e97d60d411a2dee8964d3d05adb15
SHA10a2fe6ec6b6675c44998c282dbb1cd8787612faf
SHA2568598940e498271b542f2c04998626aa680f2172d0ff4f8dbd4ffec1a196540f9
SHA5123f7d79079c57786051a2f7facfb1046188049e831f12b549609a8f152664678ee35ad54d1fff4447428b6f76bea1c7ca88fa96aab395a560c6ec598344fcc7fa
-
\Windows\Temp\{B6A8ECB2-A028-47CE-8ABF-A61F298A9389}\.cr\84e059bb286a4d546c18b3e2f61d0bc0fe7c635fd2c1ca998722324d48d1c584.exe
Filesize5.1MB
MD5267088b1382f34ff51444d323d5613ef
SHA10bfbbd4908a0f00962afc3ef4d4499fbd4be3772
SHA25647bb75d1d4d36b3f9dced0990b8a90687e57c1ac037bb1c08ad9250d3c962685
SHA5129918eb539f8e3ca623bbce989a8aaf19f2de3e91647f05207d32e2fde67b35a8b324bf40383246dab9af39c92240ca90cc1a4373b287898dc3dd89e0cb0a13b8