Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe
Resource
win10v2004-20241007-en
General
-
Target
a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe
-
Size
4.3MB
-
MD5
5a0aa688b7636d0652bc8df285e9086b
-
SHA1
d8fcfea3e6bbebf16ed389e7e2fdbae8e37309be
-
SHA256
a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231
-
SHA512
3e56444ab2e7ded5c173fd5b5018dd12b8d2adf7b5b7eca28d1ff0a9dd9a5a7902a21e4907de6f2a8d8f4c66f4c9c15dd2a733a6fe7b210367e8a3ef0715fbe2
-
SSDEEP
49152:9mr4rJLIQMaYkNU4CUPP/ax2KiPy9AuDzY:saZRUs/s2/Py9AuDzY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2716 sysx32.exe 2684 _a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe -
Loads dropped DLL 3 IoCs
pid Process 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sys32 = "C:\\Windows\\system32\\sysx32.exe" a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: sysx32.exe File opened (read-only) \??\B: sysx32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysx32.exe a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe File opened for modification C:\Windows\SysWOW64\sysx32.exe a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe File created C:\Windows\SysWOW64\sysx32.exe sysx32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe.tmp sysx32.exe File created C:\Program Files\7-Zip\7z.exe.tmp sysx32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2716 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 31 PID 2260 wrote to memory of 2716 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 31 PID 2260 wrote to memory of 2716 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 31 PID 2260 wrote to memory of 2716 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 31 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32 PID 2260 wrote to memory of 2684 2260 a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe"C:\Users\Admin\AppData\Local\Temp\a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\sysx32.exeC:\Windows\system32\sysx32.exe /scan2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\_a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exeC:\Users\Admin\AppData\Local\Temp\_a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231.exe
Filesize4.3MB
MD5caaf87a90d69d520b632dfcf2029873b
SHA1ffb03fae6a211bf838d26170e83361eee7e118b5
SHA25640599251098f6128fee0974117033fa78a6aa783dc234d490c955e535edb208a
SHA512d0449d9e37c67a71e3e9c42f3c2fa48c62de8a153520d3de030e79735fdc4ec913bf6a07c2bbbcc062a856ddfdc6443b97da2ccf807d8b52d3a072cd9b953cd8
-
Filesize
4.3MB
MD55a0aa688b7636d0652bc8df285e9086b
SHA1d8fcfea3e6bbebf16ed389e7e2fdbae8e37309be
SHA256a5482ac8e21a9dd72a8391748b68fcc47c75bb5d6b9557e8ef747beb2db3e231
SHA5123e56444ab2e7ded5c173fd5b5018dd12b8d2adf7b5b7eca28d1ff0a9dd9a5a7902a21e4907de6f2a8d8f4c66f4c9c15dd2a733a6fe7b210367e8a3ef0715fbe2