Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe
-
Size
388KB
-
MD5
7460a359bf50d12d26232d79412a3eb7
-
SHA1
59ef372a1a44bea53474700ea1479d36e668b9a8
-
SHA256
5c946780a5cab532e7c437b8b555456b319736e40b524446ce350efd29790f89
-
SHA512
1b1fcf81f063f66e83fa699de374139c5e220d61062a337adb0280e901279c1278458102c38ebe04e9bc147e9a55cd87086dc31dd08da03d33cf0fb06c604b31
-
SSDEEP
6144:/aPIWVeTdJKsLxgcSNDQL5Q9VuwLmh0kdH371oHVCvvm:/uTs1gBpQL5kmh0671o1CG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 conlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe 2032 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\allkeeper = "C:\\users\\Public\\conlhost.exe" REG.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conlhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2620 2032 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe 32 PID 2032 wrote to memory of 2620 2032 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe 32 PID 2032 wrote to memory of 2620 2032 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe 32 PID 2032 wrote to memory of 2620 2032 2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe 32 PID 2620 wrote to memory of 2376 2620 conlhost.exe 33 PID 2620 wrote to memory of 2376 2620 conlhost.exe 33 PID 2620 wrote to memory of 2376 2620 conlhost.exe 33 PID 2620 wrote to memory of 2376 2620 conlhost.exe 33 PID 2620 wrote to memory of 2356 2620 conlhost.exe 36 PID 2620 wrote to memory of 2356 2620 conlhost.exe 36 PID 2620 wrote to memory of 2356 2620 conlhost.exe 36 PID 2620 wrote to memory of 2356 2620 conlhost.exe 36 PID 2620 wrote to memory of 2728 2620 conlhost.exe 39 PID 2620 wrote to memory of 2728 2620 conlhost.exe 39 PID 2620 wrote to memory of 2728 2620 conlhost.exe 39 PID 2620 wrote to memory of 2728 2620 conlhost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\users\Public\conlhost.exe"C:\users\Public\conlhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c C:\users\Public\del.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "allkeeper" /t REG_SZ /d "C:\users\Public\conlhost.exe" /f /reg:643⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE" /v "crypted" /t REG_SZ /d "1" /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5ad88f1fc00d22a7a401142e9b02d159d
SHA16eaaa383f2e04efc290f368b55a7323fdbe7b986
SHA256a897b00e72bee37fff4d2f80786c00638c0e75bdc183817b624a8daae899a286
SHA512318503eb1c4a842955fbb4b953b16857717ee0345dd17238cbc3ef0ffdfdf9e959468c8f0973a46e39b9e08a3e89ef1a7f2c6df91377f68b4d3e3520e321f966
-
Filesize
115B
MD5fe2a06d784fe2f25235373e73049b386
SHA1b9a61457a8119dd9ebb449a3f114513a361d0eb2
SHA2562ae1e4904dbe4f97f20a07ad3b44961a9beae8c92525f3da24e16fa662519058
SHA5123f64d9f8ead2916e02a3db9baf345397972565bc4616968996f9c04515cd90b5550f09a66bf5b1928be6874dae1db0ba632e23e2ae8c51ffefadd9bfffce1f06
-
Filesize
388KB
MD518643a9a18ee51febdff616ab9072d7c
SHA11240c1e4716d7cf6cc4ac37f7aec6b15fd7b845d
SHA2561dc6bbf348071f817ffadc7f5c9907e96db25beb7ce19cd6da5309549d26fa14
SHA512ecb123d3be558f6b5dc479b565b77339570f87c963db5b1334d7022436587e40c610e4bdebb1e7b3ebea588df54dcae1932ceb3eeaeac886f4f9be5494234697