Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:04
Behavioral task
behavioral1
Sample
43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe
Resource
win7-20240903-en
General
-
Target
43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe
-
Size
64KB
-
MD5
cccec65e4307b30a20661c0b49ad4130
-
SHA1
31bc0cd56078b2af346b2dfb7ae90231685604b5
-
SHA256
43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397
-
SHA512
3bb71ea13e425fbbf93ae998fe5ee9331902dca7390998c1f14251d12e402ca117ac09f0e6b8e488d3e98deb2d1ab5f63f3ee0c59d60116d8156f5e1a7dc5a4e
-
SSDEEP
768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsPpzSd3Q:r9l+W8xFt6sh7iQroCoRB0u0sPpzStQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 bkgrnd.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe -
resource yara_rule behavioral1/memory/2508-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2508-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000a000000012033-10.dat upx behavioral1/memory/3028-31-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkgrnd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 3028 2508 43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe 30 PID 2508 wrote to memory of 3028 2508 43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe 30 PID 2508 wrote to memory of 3028 2508 43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe 30 PID 2508 wrote to memory of 3028 2508 43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe"C:\Users\Admin\AppData\Local\Temp\43363798224e0eab4bdb5ad582619c17f767e96d87059b1caae91bdf4c0e6397N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5dabfad9da09939b413209e3fc3b5fe8d
SHA1603ef130702845200720ebfb1a2c1d081f9d0c2e
SHA256d3985c6b6a23b873e7b25cd78773300e9f7d49e7dee015abc6ea0335530d705f
SHA512acbd7cbbc7a168f1a5a88d0676b2f160a80eaa88b2102b986ba117ed3b4b551ed25c582d9383ae15c5b2c442da159c2a7eef70a32bef47fdbf22b89734da9dd1