Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 03:43
Behavioral task
behavioral1
Sample
0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe
Resource
win7-20240903-en
General
-
Target
0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe
-
Size
422KB
-
MD5
505c1f8ba132bc782194763100bf1fa0
-
SHA1
933eb9e46a6d7f493ae7c326037f2f7016158f1b
-
SHA256
0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0c
-
SHA512
20e0b70806e3e929f7feab33328725a9baf2362d3f4c67d80284977792f9db350de0e0c864ccef68a2a4f075a96a58240509f5be5a7f9380d47a491b4a6ce1a1
-
SSDEEP
12288:mnRCG8owe1SRHCxH3VrBLfWHoxveTA7za:mnRCG8owe1SRGH3VrBLfWHoxveTA3a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2868 Sysceamvznkd.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 Sysceamvznkd.exe -
Loads dropped DLL 2 IoCs
pid Process 1320 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe 1320 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe -
resource yara_rule behavioral1/memory/1320-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/files/0x00370000000193e1-10.dat upx behavioral1/memory/1320-17-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2868-20-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe 2868 Sysceamvznkd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2868 1320 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe 31 PID 1320 wrote to memory of 2868 1320 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe 31 PID 1320 wrote to memory of 2868 1320 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe 31 PID 1320 wrote to memory of 2868 1320 0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe"C:\Users\Admin\AppData\Local\Temp\0c647af7727fa5e18c83f81f598f37d147da5d64130122a744ac83eb908cfb0cN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Sysceamvznkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysceamvznkd.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103B
MD597887782b5dfb808f0f51444de5e227e
SHA14266faac20f77e331363978d50706836d5d08055
SHA256fdec3226bc49b1e762b846f90ce0e16f77f11f446cb71fe8ba131dcc998d9d68
SHA5126fadb7d93f8d8fb46d97fe979f5d3ab39d21aab3daf4b41ebcc7f106bf158590857eac057674a193d068b4f3c48f50d20e9bbdfc78cffd1c3f5401c22e71a40d
-
Filesize
422KB
MD59097cc98b58fd893ebeaf0568f052dac
SHA1a6d8178a71b86191661e188b0e34afc0029985ba
SHA256618f10aa78229058f73762e4fbc0f02d19d92228905c21578805bcbcc25d082a
SHA5125eb8aff34f745335be597e2aff7cbc08c33f05e9f4f21453d69089f81d5b88e45e98a374cff1a0cd71fdc03df74a415837555b951057e93db856ac175a2192ff