Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe
Resource
win10v2004-20241007-en
General
-
Target
09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe
-
Size
68KB
-
MD5
8d8b7029e14fcd3abbd08c9a15bdcb22
-
SHA1
bfd979ac671cb08e55891b0a3ff296755cb7d8ba
-
SHA256
09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01
-
SHA512
7df793ea1e89ab612c5e14284a91ce3f2c0b3566efb9c069bd069d63ac9bdbde1b919e65264857fe3ee19bf9e0a070b7bc19e0133f050f060cbdc006c49d38d5
-
SSDEEP
768:+waGd7Lw/nrrxDL/GOv2/w6HSa0fYSPNZsxRXQ1d2yg/QmWKHZyiVlaW4OHZ0Em:+47urp3v23HSa0AMNyfQ1d2y4Z4P
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\0A9C954F = "C:\\Users\\Admin\\AppData\\Roaming\\0A9C954F\\bin.exe" winver.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe 2512 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 winver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1152 wrote to memory of 1308 1152 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 30 PID 1308 wrote to memory of 2512 1308 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 31 PID 1308 wrote to memory of 2512 1308 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 31 PID 1308 wrote to memory of 2512 1308 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 31 PID 1308 wrote to memory of 2512 1308 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 31 PID 1308 wrote to memory of 2512 1308 09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe 31 PID 2512 wrote to memory of 1204 2512 winver.exe 21 PID 2512 wrote to memory of 1100 2512 winver.exe 19 PID 2512 wrote to memory of 1156 2512 winver.exe 20 PID 2512 wrote to memory of 1204 2512 winver.exe 21 PID 2512 wrote to memory of 1664 2512 winver.exe 25 PID 2512 wrote to memory of 1308 2512 winver.exe 30
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe"C:\Users\Admin\AppData\Local\Temp\09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe"C:\Users\Admin\AppData\Local\Temp\09a99d9e2efa2f1798c3c63e657ef6122b8a6dc77098472eb9cf1f835ec50c01.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2512
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1664