Analysis
-
max time kernel
35s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe
Resource
win7-20240903-en
General
-
Target
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe
-
Size
282KB
-
MD5
f22a5d8e301c2f5624c1919300e0500f
-
SHA1
c96e1247c992f3db06c9f620b6472694b842f61f
-
SHA256
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583
-
SHA512
65881ef5aedd24702a05b06041001f2b958c5374dacd781d9ece49fa2c76fff4a30ac63955e105e70d8c16769dd7374db8b5031c80421cc9d05fd5e1925250b2
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfpY:boSeGUA5YZazpXUmZhZ6SD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 2096 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
Processes:
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exea1punf5t2of.exepid Process 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 2096 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exea1punf5t2of.exedescription pid Process procid_target PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2816 wrote to memory of 2096 2816 3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe 31 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32 PID 2096 wrote to memory of 2712 2096 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe"C:\Users\Admin\AppData\Local\Temp\3af4a8119c6a81501ce0487b0f0d89adc2c3824a8744528504f48a4676f06583.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5220cf7cdb49955845c9ea0e013922fcc
SHA131d91a6675900b251c26dbcb99569375f19505ae
SHA25632cdf0c2eccd46e8a6f6eaf26cb94525f750d3911cf8ed94fc574b2c53bd4d57
SHA51273e7cdd45d6def9fb0c1de1852d544603a2948a31d1c9c4d7f7d1b2b171559c0dd28bedd9d29bf36a85cae69b9e90a9db08f7c12ec9860dc30f262857e5ae057