Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
0e2bc3bbb537be685839790e355fe7f5.exe
Resource
win7-20241010-en
General
-
Target
0e2bc3bbb537be685839790e355fe7f5.exe
-
Size
538KB
-
MD5
0e2bc3bbb537be685839790e355fe7f5
-
SHA1
ea521b538d2edda4663aa9a287c3a8eb04dfc943
-
SHA256
3a52334a83d46e6cb089b679a46ba9c139f784899f6f93866ebb92d74d3f7419
-
SHA512
d4c49c4a2ba2be93acc47a5ec1a34538b41e341452b1d98372f41079a739d0e8ebb6d2fd3cfce273bbc7a638530ec5889957a37425357b8cbc5cd7aa2f9d7dcf
-
SSDEEP
12288:hMfzu3uphyrk6J6/FmO9pmJI08L4lspyk1MlmV8kR:hsZyrkA6/MO9pmJCdpykiC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2444 powershell.exe 2072 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e2bc3bbb537be685839790e355fe7f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2352 0e2bc3bbb537be685839790e355fe7f5.exe 2072 powershell.exe 2444 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2352 0e2bc3bbb537be685839790e355fe7f5.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 2072 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2444 2352 0e2bc3bbb537be685839790e355fe7f5.exe 31 PID 2352 wrote to memory of 2444 2352 0e2bc3bbb537be685839790e355fe7f5.exe 31 PID 2352 wrote to memory of 2444 2352 0e2bc3bbb537be685839790e355fe7f5.exe 31 PID 2352 wrote to memory of 2444 2352 0e2bc3bbb537be685839790e355fe7f5.exe 31 PID 2352 wrote to memory of 2072 2352 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2352 wrote to memory of 2072 2352 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2352 wrote to memory of 2072 2352 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2352 wrote to memory of 2072 2352 0e2bc3bbb537be685839790e355fe7f5.exe 33 PID 2352 wrote to memory of 2896 2352 0e2bc3bbb537be685839790e355fe7f5.exe 35 PID 2352 wrote to memory of 2896 2352 0e2bc3bbb537be685839790e355fe7f5.exe 35 PID 2352 wrote to memory of 2896 2352 0e2bc3bbb537be685839790e355fe7f5.exe 35 PID 2352 wrote to memory of 2896 2352 0e2bc3bbb537be685839790e355fe7f5.exe 35 PID 2352 wrote to memory of 2700 2352 0e2bc3bbb537be685839790e355fe7f5.exe 37 PID 2352 wrote to memory of 2700 2352 0e2bc3bbb537be685839790e355fe7f5.exe 37 PID 2352 wrote to memory of 2700 2352 0e2bc3bbb537be685839790e355fe7f5.exe 37 PID 2352 wrote to memory of 2700 2352 0e2bc3bbb537be685839790e355fe7f5.exe 37 PID 2352 wrote to memory of 2472 2352 0e2bc3bbb537be685839790e355fe7f5.exe 38 PID 2352 wrote to memory of 2472 2352 0e2bc3bbb537be685839790e355fe7f5.exe 38 PID 2352 wrote to memory of 2472 2352 0e2bc3bbb537be685839790e355fe7f5.exe 38 PID 2352 wrote to memory of 2472 2352 0e2bc3bbb537be685839790e355fe7f5.exe 38 PID 2352 wrote to memory of 2812 2352 0e2bc3bbb537be685839790e355fe7f5.exe 39 PID 2352 wrote to memory of 2812 2352 0e2bc3bbb537be685839790e355fe7f5.exe 39 PID 2352 wrote to memory of 2812 2352 0e2bc3bbb537be685839790e355fe7f5.exe 39 PID 2352 wrote to memory of 2812 2352 0e2bc3bbb537be685839790e355fe7f5.exe 39 PID 2352 wrote to memory of 2912 2352 0e2bc3bbb537be685839790e355fe7f5.exe 40 PID 2352 wrote to memory of 2912 2352 0e2bc3bbb537be685839790e355fe7f5.exe 40 PID 2352 wrote to memory of 2912 2352 0e2bc3bbb537be685839790e355fe7f5.exe 40 PID 2352 wrote to memory of 2912 2352 0e2bc3bbb537be685839790e355fe7f5.exe 40 PID 2352 wrote to memory of 2844 2352 0e2bc3bbb537be685839790e355fe7f5.exe 41 PID 2352 wrote to memory of 2844 2352 0e2bc3bbb537be685839790e355fe7f5.exe 41 PID 2352 wrote to memory of 2844 2352 0e2bc3bbb537be685839790e355fe7f5.exe 41 PID 2352 wrote to memory of 2844 2352 0e2bc3bbb537be685839790e355fe7f5.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XEYnuaCLo.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XEYnuaCLo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp12E5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"C:\Users\Admin\AppData\Local\Temp\0e2bc3bbb537be685839790e355fe7f5.exe"2⤵PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580e5f7ff521945c2e73a58e1fc762aa1
SHA148744760ba8a8b5faf54e89ff7317ab948e7b516
SHA256a4b515bb3d5f389a8d89a5834fe6f10f0090463873d52c712a8d5732c790eed1
SHA5129edd2827655a9aeb13cff965008eab951eed90e41ab570454e84fc65287b70841831484a854f0de3381e40eed34d18cbe719a0faab01fca209e5330eb635e167
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0E68TPVK4GN3508SIWG5.temp
Filesize7KB
MD5c604da2ec025c47b19f204fb406595da
SHA15b8378e83abf967b583242ff9504526314eb35db
SHA2566211ab0d97500134b833d22dfac32db4c47d9f8cfb5d8f041113b668945be91c
SHA512519c089a7f15714c494153ee1cfc6c7dbe143a38d006e52daad2849e6fdb7445191d756f4cbd36fdd7dcb7fcfaa6da29962cb41a1eaf1f7ae555f9fefa0ded46