Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 18:11
Behavioral task
behavioral1
Sample
7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe
-
Size
160KB
-
MD5
7ff1ab6162b4c035b8a1f9327e1e43c0
-
SHA1
e25c6d31d092a310aa8a9f67dcc2d03270735507
-
SHA256
7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60
-
SHA512
ba5dcfeb503d300e2314aeb249c67556c7c8b2f8b9fadd7cb48b421aaece914a6b8861cc16885d9a6554cab98c883c4efc0e83cf30559f663d9fc4851b67a3f6
-
SSDEEP
1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\1A283587 = "C:\\Users\\Admin\\AppData\\Roaming\\1A283587\\bin.exe" winver.exe -
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2328 2344 7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe 32 PID 2344 wrote to memory of 2328 2344 7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe 32 PID 2344 wrote to memory of 2328 2344 7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe 32 PID 2344 wrote to memory of 2328 2344 7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe 32 PID 2344 wrote to memory of 2328 2344 7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe 32 PID 2328 wrote to memory of 1224 2328 winver.exe 21 PID 2328 wrote to memory of 1112 2328 winver.exe 19 PID 2328 wrote to memory of 1172 2328 winver.exe 20 PID 2328 wrote to memory of 1224 2328 winver.exe 21 PID 2328 wrote to memory of 860 2328 winver.exe 25
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe"C:\Users\Admin\AppData\Local\Temp\7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2328
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:860