Analysis
-
max time kernel
84s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe
Resource
win7-20240903-en
General
-
Target
6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe
-
Size
254KB
-
MD5
0676798cb430804268472910ad8a1750
-
SHA1
82c2dc99275e7ca0935be96a9fab6ca7b976aed0
-
SHA256
6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057
-
SHA512
722c1160042d11a98248fa4e17596f880dd5e7a6e95b832bc6f2b0f5c14ca067b484f2bdc5c0480569c2e33472ab5cd65250c471c5cda5840c932b0bb118a2f9
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQqC:EeGUA5YZazpXUmZhJC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2676 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 2676 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2664 wrote to memory of 2676 2664 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32 PID 2676 wrote to memory of 2632 2676 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe"C:\Users\Admin\AppData\Local\Temp\6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD51193cc7be3a20ebaf698000290ede1b0
SHA1ae0cb62e04ca8133777c2309385d36d28a44f473
SHA2567c3cd2d7127e6dbc65c6e1a06ae313bc997dc06cbd2c834a5f49a61e0b13d62a
SHA5126eccb088c5aa9d945c90e0dec5f9bfd39cfd83005cfce15d7be25c0fc85a7c48e1236fd46a465092798773b2f2f75d3ff1fe14c0894a3a150e8a82b4c6962f38