Analysis
-
max time kernel
38s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 13:23
Behavioral task
behavioral1
Sample
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe
Resource
win10v2004-20241007-en
General
-
Target
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe
-
Size
14KB
-
MD5
4e2eefba72e74b912f088109cb11c75d
-
SHA1
9fb908ff7d3009677e43f890f93ae2d10e75bc04
-
SHA256
5b0441fbb03237c5c83f302dc8e58e451b5e6ff9476ffb57102069161d391a8e
-
SHA512
0330d57f775492a23e3298f0c2cdb97d2f5dc1b4877f194fa47bdc69c8d0df8a02016af3377b88616cb0f7017ed0cd57b70dcfc7698cf913e48344d7f618f3df
-
SSDEEP
192:Y+8C+EKS0O9ejYTDG8bcp4LlnGnieXubWyD9JEBkGxVX4qoNxRJc:YNVjYTDG8gp2leXTyD3EnxHoNW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WScript.exe1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exedescription pid process Token: SeDebugPrivilege 2432 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exedescription pid process target process PID 2432 wrote to memory of 1324 2432 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe WScript.exe PID 2432 wrote to memory of 1324 2432 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe WScript.exe PID 2432 wrote to memory of 1324 2432 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe WScript.exe PID 2432 wrote to memory of 1324 2432 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.dat-decoded.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RawrHJf.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD54e6a5451629d34d61f43f320adf29364
SHA1f534fa53b3acf7d5f459042288f5dd8e157f1a94
SHA2566c0fbefd874ab5c3e4ec8e91e861592fac9a743fa27db77e0571013b6170dbbc
SHA5123b4108044db8cdc8f198fa7287452ba5cdd069ae5ce982cf041c2a77408efc70710b2d4fd0808053dd962b486c7776dcf31696fcc4bc917c5b1c12695435a9a5