Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe
Resource
win10v2004-20241007-en
General
-
Target
eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe
-
Size
1.1MB
-
MD5
62b5006566dc1c5c7c69e6478aabd880
-
SHA1
2b089643faa572bbf41eda7afed4b6736e3a998c
-
SHA256
eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8
-
SHA512
8fdc31ca17300eebd6de0d93e6c294a7c909d9e6be4769dc4f0d10e6dad1a0b1b9e40018f3979032ed7956ace04a719f6299f7feab2e72abc4ad356f61db39a8
-
SSDEEP
24576:gRW3N/0f/oAPoRBchI5anfOlAUAi1K6oElG4lBujFAvCyR7:g5ApamAUAQ/lG4lBmFAvZ7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1512 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe 31 PID 2360 wrote to memory of 1512 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe 31 PID 2360 wrote to memory of 1512 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe 31 PID 2360 wrote to memory of 1512 2360 eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe"C:\Users\Admin\AppData\Local\Temp\eb08e852ea0b743d2531fd371b93803f769a5de38ba47d9e4bbca425fce6a4b8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753B
MD5bf19fdb9df77b101f8bb0814628e6782
SHA1ffc6bf30d3f8483c95ef2a3f0f22f393d0678760
SHA256e820fe7b4750e50639d1b7f552c206b572400268269c157b02ea87da69b7e7ed
SHA51256ec94b0d8436f93c1060ae07bb0127c87b930a73856f218b03444815a573a7295cd7a42e06b57b583b1db79fe9df62ce40a5fcfd6c5d9dcd37d3277780d5f99