Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe
Resource
win10v2004-20240802-en
General
-
Target
309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe
-
Size
250KB
-
MD5
fcd3a9f2c7b002caf8c38e9cf3538880
-
SHA1
4ef8b2fc3827ff326439c7aa644279720b2c8635
-
SHA256
309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42
-
SHA512
40f7905ae8578711996cb3de95e0906779d41e4b9e2ccf3af15f622a74d96c00f8185150d19ef9020de4a867afd1971208162879263f7771b700c1801b94aba8
-
SSDEEP
6144:oxZ3ZqXwFH59B1vpAsINVDK3J8ZT8wYM+6k6fLePUDdFMH8/dno:orZDZRV2OZ8trB+6hf5dr/O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1212 j8zwCv830kViFmO1.exe -
Executes dropped EXE 2 IoCs
pid Process 2144 j8zwCv830kViFmO1.exe 1212 j8zwCv830kViFmO1.exe -
Loads dropped DLL 4 IoCs
pid Process 3724 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 3724 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 1212 j8zwCv830kViFmO1.exe 1212 j8zwCv830kViFmO1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vE646iI0Q09u1ufr = "C:\\ProgramData\\fxU5OkJxldQO\\j8zwCv830kViFmO1.exe" 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3452 set thread context of 3724 3452 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 82 PID 2144 set thread context of 1212 2144 j8zwCv830kViFmO1.exe 84 PID 1212 set thread context of 3260 1212 j8zwCv830kViFmO1.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j8zwCv830kViFmO1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j8zwCv830kViFmO1.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3452 wrote to memory of 3724 3452 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 82 PID 3452 wrote to memory of 3724 3452 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 82 PID 3452 wrote to memory of 3724 3452 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 82 PID 3452 wrote to memory of 3724 3452 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 82 PID 3452 wrote to memory of 3724 3452 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 82 PID 3724 wrote to memory of 2144 3724 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 83 PID 3724 wrote to memory of 2144 3724 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 83 PID 3724 wrote to memory of 2144 3724 309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe 83 PID 2144 wrote to memory of 1212 2144 j8zwCv830kViFmO1.exe 84 PID 2144 wrote to memory of 1212 2144 j8zwCv830kViFmO1.exe 84 PID 2144 wrote to memory of 1212 2144 j8zwCv830kViFmO1.exe 84 PID 2144 wrote to memory of 1212 2144 j8zwCv830kViFmO1.exe 84 PID 2144 wrote to memory of 1212 2144 j8zwCv830kViFmO1.exe 84 PID 1212 wrote to memory of 3260 1212 j8zwCv830kViFmO1.exe 85 PID 1212 wrote to memory of 3260 1212 j8zwCv830kViFmO1.exe 85 PID 1212 wrote to memory of 3260 1212 j8zwCv830kViFmO1.exe 85 PID 1212 wrote to memory of 3260 1212 j8zwCv830kViFmO1.exe 85 PID 1212 wrote to memory of 3260 1212 j8zwCv830kViFmO1.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe"C:\Users\Admin\AppData\Local\Temp\309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe"C:\Users\Admin\AppData\Local\Temp\309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\ProgramData\fxU5OkJxldQO\j8zwCv830kViFmO1.exe"C:\ProgramData\fxU5OkJxldQO\j8zwCv830kViFmO1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\ProgramData\fxU5OkJxldQO\j8zwCv830kViFmO1.exe"C:\ProgramData\fxU5OkJxldQO\j8zwCv830kViFmO1.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe" /i:12125⤵PID:3260
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD542463cb570cb618503f8387f4801712d
SHA13d42ef5305d0906feced1875786d2b83e1c29b8a
SHA2567730328f4a1c26583b14e47848a91a7e2581c75e6684f04860292da713cfbc67
SHA512a952aea7a499673e51c6bf59e51c8e2b5471125ad508a7fe4589681858957daee9c709aa60ea39b0e1d17594de9afae7861890a6aa6aec8747d7c4e5c914ba41
-
Filesize
250KB
MD5fcd3a9f2c7b002caf8c38e9cf3538880
SHA14ef8b2fc3827ff326439c7aa644279720b2c8635
SHA256309f02cee7d24d73ac7aba5671a0fd41b3aa9807e935fb14e5ee441dd9433a42
SHA51240f7905ae8578711996cb3de95e0906779d41e4b9e2ccf3af15f622a74d96c00f8185150d19ef9020de4a867afd1971208162879263f7771b700c1801b94aba8