Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe
Resource
win10v2004-20240802-en
General
-
Target
6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe
-
Size
414KB
-
MD5
ee9ce4c2526d5825f5c16749e9d9c7f0
-
SHA1
793747801523720fa82914da3154d50f4b0b2cee
-
SHA256
6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141
-
SHA512
730a7bc67db70aa61e9be49dd3a19a8c9dd5bd1365e9b18d317eee3cb3c9a36bf269f9a4ea9820a99d72a89c301de8e32362627569871cbe4c95b3aafdcda71d
-
SSDEEP
12288:jejzO5dHsd2bb+4sX7QJpMLEGvnC/OZTDlrAJhxRP:ldM26uMLhvnxZTDwhxR
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\s2er333vice9.ini 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 Call.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\Realplayer\skipto\Call.exe 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Call.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 2132 Call.exe 2132 Call.exe 2132 Call.exe 2132 Call.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2132 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 30 PID 2172 wrote to memory of 2132 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 30 PID 2172 wrote to memory of 2132 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 30 PID 2172 wrote to memory of 2132 2172 6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe"C:\Users\Admin\AppData\Local\Temp\6c417a2e67528ffacb761d0db0b3fd26b241b2ee67670efa6f23e9efa0a17141N.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\program files\Realplayer\skipto\Call.exe"c:\program files\Realplayer\skipto\Call.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5b95087ef73b519e628844c32379b4a09
SHA1ae968cef078b2e4a42a5fd65594b928d15462510
SHA2568ff07f1f5451c1768e675dbeecb2005db46ca4b43a3205effbaa356bf047c21a
SHA5120bb92409e1ed5622b81eda87944d024b21aa279d812203312b793c941cee951485b8c5bf3d4188f8d8093faf8e5e3ed609b0e372d145715c696440c5f4e30c20