Analysis
-
max time kernel
38s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 23:59
Behavioral task
behavioral1
Sample
bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe
Resource
win7-20240903-en
General
-
Target
bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe
-
Size
6.4MB
-
MD5
decd69850749812d81cb32c7e9cc24b0
-
SHA1
bd2b5c52f6882c492a9ce4f3d68e2d82d7dadd5f
-
SHA256
bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6e
-
SHA512
853bddf57829708c0809c7c16c8a19f9dc511879e3949cb0ee343f79fb04e80ac0b0413b9210149cf18007a469f9c917a422e4d9bc1b2e624c560600560abe0c
-
SSDEEP
196608:0suAqMdlAfcdlhzU9GNdlAfcdlftI7dGdlAfcdlhzU9GNdlAfcdlO:PqKzSGsdYzSGO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0007000000012117-11.dat upx behavioral1/memory/2348-17-0x0000000000400000-0x000000000065C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2348 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 31 PID 2148 wrote to memory of 2348 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 31 PID 2148 wrote to memory of 2348 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 31 PID 2148 wrote to memory of 2348 2148 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 31 PID 2348 wrote to memory of 2712 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 32 PID 2348 wrote to memory of 2712 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 32 PID 2348 wrote to memory of 2712 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 32 PID 2348 wrote to memory of 2712 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 32 PID 2348 wrote to memory of 2768 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 34 PID 2348 wrote to memory of 2768 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 34 PID 2348 wrote to memory of 2768 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 34 PID 2348 wrote to memory of 2768 2348 bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe 34 PID 2768 wrote to memory of 2900 2768 cmd.exe 36 PID 2768 wrote to memory of 2900 2768 cmd.exe 36 PID 2768 wrote to memory of 2900 2768 cmd.exe 36 PID 2768 wrote to memory of 2900 2768 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe"C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exeC:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe" /TN vphawsPt128a /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN vphawsPt128a > C:\Users\Admin\AppData\Local\Temp\2ohfXSmJ.xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN vphawsPt128a4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d05c0bbb558400714ee21b3cac8aa37d
SHA1bbb80373039bc96669dcacab3ed2b91c85c67010
SHA256c75458ff9ce8ee02dffb3a312c4b9f42a73718123fcad444ca426ff1c94139b7
SHA512f72daa01cb84dd6fad97cc97618659c03b0f8c1966fcfdc627306841ac66b0cb1ff6f2f1ddcf9c23d2960a1d967fdded46fa8f966428908d439cd09d487169fc
-
\Users\Admin\AppData\Local\Temp\bbecc2df1f006e745283df6012fbb9a15fb73acf6c819d17b4ce3cce82bb7f6eN.exe
Filesize6.4MB
MD556d59b384fdf9113af051f113c91c727
SHA1984670bf949476e21c64ef8ec567d12327371a4a
SHA256415d84448731546373ebaa8b8e3882050a158317c12439b70c261564df759cf2
SHA512c04d1009cb77cd76c7cda246ba0d64223434049fc929ce880322eda216f613010ce26b5b839532538123b56d26bca7693919d198f1715f275a0d2f7ec9a8f195