Analysis
-
max time kernel
35s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe
Resource
win7-20241010-en
General
-
Target
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe
-
Size
282KB
-
MD5
8e9cdc4e61e16fef150dac299e2585ad
-
SHA1
cdd3dff78562abc8937b2d8cb614ba2b716aaad4
-
SHA256
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda
-
SHA512
4161a1868488b88942cd9fe0ea65145deedaedf4ae3654c9cc77fa0afea2b4b3c005be7fdf7dad31a635f40108ae46d7cee571cdf0d0562a0e1deca408a254b6
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fKkfM9:boSeGUA5YZazpXUmZhZ6Sh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid Process 2892 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
Processes:
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exea1punf5t2of.exepid Process 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 2892 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exea1punf5t2of.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exea1punf5t2of.exedescription pid Process procid_target PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2392 wrote to memory of 2892 2392 3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe 31 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32 PID 2892 wrote to memory of 2748 2892 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe"C:\Users\Admin\AppData\Local\Temp\3a39b16020e7e439c110c43bc0e117ab059268b1b999f1f0af1b625b1f553eda.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD548eb6901505ce2a8937e09f1a035c3d6
SHA13043fbe92aed75eb99fa1d466ca23faeeb745851
SHA256e03576d64e9d641e474f40dbebe85df2b011ea712432a6744cff9226ec3268ed
SHA512d6d572d7d1abe9b013ddba7d56dc8423aaf6635988c9f91a61562cdf4ade06d5948784c4826f272a9c66765ea45f520abaf70eff83c869af0085aba8c784204c