Analysis
-
max time kernel
15s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 23:32
Behavioral task
behavioral1
Sample
7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe
Resource
win7-20241010-en
General
-
Target
7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe
-
Size
49KB
-
MD5
a7cee4cbe778ccfe05f752478358c9eb
-
SHA1
7617bbb5a45b4c65cd02495b0de8aeec6d86dcbc
-
SHA256
7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06
-
SHA512
5a6dd9eeb9063afef94437a0d16ad9897591f9438c48ff0876663ba4576255f85c581ab13c8d9877c1cdc9216409b67aeedef52f684f7b44098c0c6b0282c050
-
SSDEEP
1536:stdgI2MyzNtRQtOflIwoHNV2XBFV72B4lA7PsnPH8WOfR:stdgI2MyzNtRQtOflIwoHNV2XBFV72Bz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 hhcbrnaff.exe -
Loads dropped DLL 1 IoCs
pid Process 2904 7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe -
resource yara_rule behavioral1/memory/2904-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2904-8-0x00000000030E0000-0x00000000030EE000-memory.dmp upx behavioral1/files/0x000c000000012264-6.dat upx behavioral1/memory/2904-11-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhcbrnaff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2860 2904 7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe 29 PID 2904 wrote to memory of 2860 2904 7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe 29 PID 2904 wrote to memory of 2860 2904 7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe 29 PID 2904 wrote to memory of 2860 2904 7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe"C:\Users\Admin\AppData\Local\Temp\7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5a0bc4f18b9afabd5bd524cbc653e2a22
SHA181c51c1eee0e2ee88513b0ce34de6170460d8163
SHA25646a4caee53548c8a67ae15641c1aff8f26b0bf51ebe06ab68c480cb4ec7788db
SHA5121f3de3c58ee22630c59f40e988f23a1dac31543c0627cf90e733e4bb01e012ae9e5423217fe7e369575d08010df33c4009525f10ca004b2e0eda4c68d0754b69