Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe
Resource
win10v2004-20240802-en
General
-
Target
ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe
-
Size
2.3MB
-
MD5
85134b1068ba18f9c908ccc455875770
-
SHA1
a6cd8e787a4c53c61193b6512e82e11163952775
-
SHA256
ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6d
-
SHA512
1fa85c7b599684cc115a92a28777ed29115f3595d9a291edf82d74b72f75744548b3b16b09d7c7833d7ba6be8ea0ca04cf86a8282dec576c2bfefe8f5370b7db
-
SSDEEP
49152:f1OsZ4FrDBfT/D4QhGdMIL3Eph5uvFvwQDSM+SG57UFuNemLoNBDIHhH8AF+:f1Os4JDBr/MaGdMq0wFoQD3oUFuAmEjB
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts tm-agent-remover.exe -
Executes dropped EXE 2 IoCs
pid Process 2300 tm-agent-remover.exe 5088 7a6ae2255c4b480b8724046a4a9d26bd.exe -
Loads dropped DLL 3 IoCs
pid Process 2300 tm-agent-remover.exe 2300 tm-agent-remover.exe 2300 tm-agent-remover.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tm-agent-remover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a6ae2255c4b480b8724046a4a9d26bd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2300 1196 ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe 82 PID 1196 wrote to memory of 2300 1196 ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe 82 PID 1196 wrote to memory of 2300 1196 ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe 82 PID 2300 wrote to memory of 5088 2300 tm-agent-remover.exe 83 PID 2300 wrote to memory of 5088 2300 tm-agent-remover.exe 83 PID 2300 wrote to memory of 5088 2300 tm-agent-remover.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe"C:\Users\Admin\AppData\Local\Temp\ebd08ccfa5568eeee226aa06397f877621b3ea4bc6590cc35bbfee56ab230d6dN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\7zS9D49.tmp\tm-agent-remover.exe.\tm-agent-remover.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\7a6ae2255c4b480b8724046a4a9d26bd.exe"C:\Users\Admin\AppData\Local\Temp\7a6ae2255c4b480b8724046a4a9d26bd.exe" --013⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD599296aa145c422a0bb687bb1d8bb9744
SHA16fb638d62af27dd8d507b38f2f04e13cd125f2d8
SHA256b9ff4485881eac76997ffdafc8a2429ca7d8b0003e082f96ae72b26930d3b2ef
SHA512688d1db085a66377b3bcb2ee0ff88f09d94841724d135e4383812634fcfba29b8a4d0f8291fd856db8fb3a4d0c6f79f26a64802388d78761fe65c7ef077270a9
-
Filesize
7.1MB
MD5887044bfd11c65bd92488e8f92f5e757
SHA14b6e8b85f1d493dd2124453dd04df4121047f314
SHA25693ba910a10eb1bd7b277ab66939c958ddbcff51f1fa58b85ece2d627165a0d14
SHA512b806146b2f8c43c3ff84beb3f355fc9df70b6b9d5aa98cbbb13531d793c992dbb36d0ec096e1272b378de784fb28343c2caf69ad9fc01d31ab97b9583c509935
-
Filesize
13KB
MD506203e59a31d5adab0ee4deba5292a6b
SHA1baac5c9a6e2f55a77cee22ba8de76116eb58d8fe
SHA2569bb4f099d1e6a4880651a5334595eee2a4ebf724dab51c6ea697bb0fecd45268
SHA5121200be9c27a27e10b747bc366e7754560e3b528cec8dd5aea5e317eb4d6380c5e2380d50ff91fb9f3aa21c7c3de89ebcc4688912f210cf919f3b6ad7ce339127