Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe
-
Size
388KB
-
MD5
a1aa9fc284a78253608b54c1ae6c681f
-
SHA1
9523103ebd0f1fa5987bb0cfb48c5c89ad4db717
-
SHA256
176aa707017e73c91de26c96856a10a014f69c881638f4ee2c6cac6b533b2ffa
-
SHA512
0b46e63c4bdc5a3b552f1de3c90a2e21e8e31bbd6fc98d8c7f3b45cf43d1ce4560b07ff53a68dc3ac6f6af1ad84f6e58943ae55f516a89fb4fe6f4538705422b
-
SSDEEP
6144:/aPIWVeTdJKsLxgcSNDQL5Q9VuwLmh0kdH371oHVCvvy:/uTs1gBpQL5kmh0671o1CS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1248 conlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\allkeeper = "C:\\users\\Public\\conlhost.exe" REG.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conlhost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1248 4212 2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe 86 PID 4212 wrote to memory of 1248 4212 2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe 86 PID 4212 wrote to memory of 1248 4212 2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe 86 PID 1248 wrote to memory of 3512 1248 conlhost.exe 87 PID 1248 wrote to memory of 3512 1248 conlhost.exe 87 PID 1248 wrote to memory of 3512 1248 conlhost.exe 87 PID 1248 wrote to memory of 4160 1248 conlhost.exe 92 PID 1248 wrote to memory of 4160 1248 conlhost.exe 92 PID 1248 wrote to memory of 4160 1248 conlhost.exe 92 PID 1248 wrote to memory of 2384 1248 conlhost.exe 95 PID 1248 wrote to memory of 2384 1248 conlhost.exe 95 PID 1248 wrote to memory of 2384 1248 conlhost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-10_a1aa9fc284a78253608b54c1ae6c681f_7ev3n.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\users\Public\conlhost.exe"C:\users\Public\conlhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\users\Public\del.bat3⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "allkeeper" /t REG_SZ /d "C:\users\Public\conlhost.exe" /f /reg:643⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE" /v "crypted" /t REG_SZ /d "1" /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177B
MD5fc605d0a0029f229d0ed645293ece316
SHA19ee4a83cd232b15790107ebbb98b4b515839f219
SHA256a2a678d59020d212a1ec32810466b9a2bc4d17fcfff8edd6c07c5aa8ef15b25f
SHA5122e43a1bbb43f9371cfcdcf550a205bb123a2facf17cbdd180591eb7a7c3ee75b5aae0a59654898814e4dee9d7bdf4ff3f6b50a37f0fbd5252865a23655b261e1
-
Filesize
388KB
MD50b93b82b0c3b6732314d17d6d864152e
SHA11c8b254e5bbabbb794d8f0cafaef1821b07f1eb5
SHA2562901bc2c27540d4dc9718d25d30e5349823ddbb49c03f6a805c1e397c3727db5
SHA5127eea5d02d0774712ed694e2700497c7531c9476a3f05b791842c31fa0cc98c9cc7a9fe0bb6a363f36160f75faf2621807daa6a8b389674c23eeb8f4d4df7861e
-
Filesize
115B
MD5d285bb11b0fb4db4627de1708810f62b
SHA1e2ea7f2a48a9169dbe93e4ee5e238fe6beb3b9fe
SHA256b1f0346b9eb5b488449d5dec41f5ff004a7a823ac19f97732609ac53be6d82c9
SHA5126645a58ce061e0f7105c4c540db139f678b41b1397ea42de82f399a87ddd5f4f07423f5b82710fea3850367aa1b0822fd0e0aa6d009b100a4f93187b059d1bbb