Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe
Resource
win10v2004-20241007-en
General
-
Target
39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe
-
Size
289KB
-
MD5
1bbf3d2f752c521719966873af4e9760
-
SHA1
ce3a55eaa4a5a53629a0614d3905c07de1f2fef1
-
SHA256
39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29
-
SHA512
04062dc3206d7c92c3e89a728012f2ba9d07f7cf46fea2dbe5a06f35f148c2b57ef184a5e1e72d8a80054c5813122a0db81479c8f0e9eb64d0b669d953ee362c
-
SSDEEP
6144:fiyz+vqfL+8OaAH2QYepZ3SgkECzJLaQVbU5:qgLOaybYeLdklJLJbU5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2456 TWF.exe -
Loads dropped DLL 2 IoCs
pid Process 868 cmd.exe 868 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\TWF.exe 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe File opened for modification C:\windows\SysWOW64\TWF.exe 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe File created C:\windows\SysWOW64\TWF.exe.bat 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TWF.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 2456 TWF.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 2456 TWF.exe 2456 TWF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 868 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 30 PID 1724 wrote to memory of 868 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 30 PID 1724 wrote to memory of 868 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 30 PID 1724 wrote to memory of 868 1724 39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe 30 PID 868 wrote to memory of 2456 868 cmd.exe 32 PID 868 wrote to memory of 2456 868 cmd.exe 32 PID 868 wrote to memory of 2456 868 cmd.exe 32 PID 868 wrote to memory of 2456 868 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe"C:\Users\Admin\AppData\Local\Temp\39842379b837ad89b30b0675f81ba5fc69beff3b24c954be8114850d7a9c1b29N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\TWF.exe.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\windows\SysWOW64\TWF.exeC:\windows\system32\TWF.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD5b532fc215ee64ef148a64161bb31a1bc
SHA12dc35004383b24e6044b57ae6316785842aabd08
SHA25674171c5c001a93d9654ef0dc5a7e202023ac86386a97b55e6b3faf74954b14d8
SHA512865920490c6ad77e2428f5bbf52481d9ea530398e9464f4b02da6156bbe603b00b1f8a850d6eddc28c4739b019b4e57d1e419b71f450a86b381be2c54d68ee65
-
Filesize
289KB
MD56d81e350f93a3881bddf60515532dc90
SHA1f60ae752b96120185c416c887262542b7d8852fb
SHA2561bcc1209affcf300e9257779b34745b3d1ea671c234042e8f025a2b2cb7962d9
SHA512682f7070f48e39ff2f9c343f99b052ea326a9c0f35ee11744406f258a7706768250641d091d50bfff8a1f80de8a5d12ae0969439c5200a9af8c9bc7ae5e7ba4d