Analysis
-
max time kernel
83s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 04:43
Behavioral task
behavioral1
Sample
098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe
Resource
win7-20240903-en
General
-
Target
098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe
-
Size
63KB
-
MD5
6b20b0acd566b78a4e0ddc2a2175f5b0
-
SHA1
8ab8744bc2d48b4b5429005eba835756b790cc7c
-
SHA256
098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191
-
SHA512
477f97ace5f43181d81b7a57d60628a267a2bcc63b075d49cf35d2565c2163172b5a530d596820f9b850f385df3ebadb9bfb0209e9ff13dd99d7b2cab13fec6d
-
SSDEEP
768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsPpzSdtKx16:r9l+W8xFt6sh7iQroCoRB0u0sPpzSS16
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 bkgrnd.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe -
resource yara_rule behavioral1/memory/2236-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000700000001211a-5.dat upx behavioral1/memory/1616-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2236-10-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkgrnd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1616 2236 098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe 30 PID 2236 wrote to memory of 1616 2236 098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe 30 PID 2236 wrote to memory of 1616 2236 098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe 30 PID 2236 wrote to memory of 1616 2236 098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe"C:\Users\Admin\AppData\Local\Temp\098162ecbe829012c6ebafaae44f2842699f30caf772159497ff68d522c04191N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD59b5b47d1c4910d6c8afd08610e7c7fea
SHA148571097dbda47afb9ba451ee8d8f4d1bde91dd7
SHA256873f785b172783c97ab4222892db0c86491c137a0db2a3f70286021ceff651fd
SHA512cf3a27f2d346157a91fe93f9c35494ae26fb6d5af11d67c8953272ae35a8d17931472d02ed9f952d04d74c524b52f639fb33e42f2c1132a6504c5d584970446a