Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
267.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
267.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
300.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
300.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
308.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
308.exe
Resource
win10v2004-20241007-en
General
-
Target
267.exe
-
Size
146KB
-
MD5
068400d929db33e9991f4188f74a3c96
-
SHA1
d57c6efe65e8d1d60e98acbd5536daa065037011
-
SHA256
9ffe6cb3a60d37f590e4448c9fdfda66ccf4aa045b727c262d33866fea6ba802
-
SHA512
6cacd0096a6ccb5486f44b4c1889613a8f0db0075db45ae34577f5dc95c0184f60f3cc992219675faecce47980bf154388eb2403b792db21f26a0c190ce4ada8
-
SSDEEP
3072:ABAp5XhKpN4eOyVTGfhEClj8jTk+0htpcZVrJ6:3bXE9OiTGfhEClq9GOHrJ6
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 4 2804 WScript.exe 7 2804 WScript.exe -
Drops file in Drivers directory 3 IoCs
Processes:
cmd.exeWScript.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
Processes:
267.exedescription ioc process File opened for modification C:\Program Files (x86)\Compa1\New11\Uninstall.exe 267.exe File created C:\Program Files (x86)\Compa1\New11\Uninstall.ini 267.exe File opened for modification C:\Program Files (x86)\Compa1\New11\ch092z.bat 267.exe File opened for modification C:\Program Files (x86)\Compa1\New11\kolupasi.vbs 267.exe File opened for modification C:\Program Files (x86)\Compa1\New11\zubizaba.vbs 267.exe File opened for modification C:\Program Files (x86)\Compa1\New11\silk.note 267.exe File opened for modification C:\Program Files (x86)\Compa1\New11\skak.riot 267.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
267.execmd.exeWScript.exeWScript.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 267.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
267.execmd.exedescription pid process target process PID 516 wrote to memory of 2772 516 267.exe cmd.exe PID 516 wrote to memory of 2772 516 267.exe cmd.exe PID 516 wrote to memory of 2772 516 267.exe cmd.exe PID 516 wrote to memory of 2772 516 267.exe cmd.exe PID 2772 wrote to memory of 2828 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2828 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2828 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2828 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2804 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2804 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2804 2772 cmd.exe WScript.exe PID 2772 wrote to memory of 2804 2772 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\267.exe"C:\Users\Admin\AppData\Local\Temp\267.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Compa1\New11\ch092z.bat" "2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Compa1\New11\kolupasi.vbs"3⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Compa1\New11\zubizaba.vbs"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD568dc908dea12ecfbe385dea564e1e050
SHA1e22a35a206d117d5719329614cd493385d2ff004
SHA256ca52d263102ff07f9c9f50b514f740f130c87b01c0e8e7dfee99af9bc4142ccd
SHA5128eb8acab68e024d76a9ec95fa426c96d4b6d659fa47711c4a94f926558499fcd763dce2234b5db44e9d08d0028f13889633c232d54721ba6dae88ecbdd12c70a
-
Filesize
899B
MD5427b84c71e9634149a2931de84de0a03
SHA1cfec7ba4fe09ba83fecfd53d6e1483f1e1e401a2
SHA25631497aae4731f1f4004f4061940b1e9048423c2a3b7eb149477e53e92c426d36
SHA51277302000c24addb4ce46a5dd1c54a53eddf62fa8a5ae36bb0fe001b79f3805834b33966fa23e8165ab324435bac1f34bf7f2499e1b85b3ac0a6b151ff29caaff
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
49B
MD5b1f7a6ca78673cc6706fc35136284444
SHA1e0fd1dc7a7744ac1507f1b96ea16d5a86f4d3db4
SHA25682e77432178658af118b16aa1a04494c138ac86ed407a8d345fcd384e5153119
SHA512179961c39493ca850bd92f802b58c1ef7e1c51d3464f012e88ca0bcef086173897a8d0da08c550af0688f2d75e4d78f6eb9213c4ed5e45dcb564693f46007a92
-
Filesize
309B
MD5ef97c4736187d9e01fb74f18fdcadea9
SHA1b1cfa056264bece992c4854713bbfa9a2bfe0476
SHA256db3c11025b3b5d10b047b4ab169a7cddd194e2b983b6ee4d3d7c064e88d830f1
SHA51296e4231706f98854869853c7f81bf23cf8ba6396fb2f49242f1b4f660b1d97b6e44e3adf185d44e8d6168bc4ad635dc948412da70425039de405824060d05d72
-
Filesize
1KB
MD56b625709543445d82ebd6613a16b692f
SHA14663418f7ac8bf57c0fd711ce958cbd8d41c18a4
SHA25642b5ea3130726ee55078c1a30f33458920884b43ee3034fa092b6a2188d62303
SHA5128e1b23bb7b17d84bfb9567323d6a3b8e06f480c9cd9b6148b54b716108284a33edcde44aadcb396835916a8d162b4055d2ea683671f74e98dac36f96855b18c6