Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe
Resource
win7-20241010-en
General
-
Target
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe
-
Size
278KB
-
MD5
c53f5caf018a2dcc2c9453dda975d043
-
SHA1
a642749b3d7cf2f902c1395b7caf17ab3142930a
-
SHA256
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f
-
SHA512
2dd3ae2523afd2c29c78bb07bd4bb536dc914c8ab3175c52a41771584327232819280cf32912f47c8036fa3f8234f5715cf45898b9e7d0b04fe2744de4d97991
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fB:boSeGUA5YZazpXUmZhZ65
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
a1punf5t2of.exepid process 2980 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
Processes:
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exea1punf5t2of.exepid process 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe 2980 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exea1punf5t2of.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exea1punf5t2of.exedescription pid process target process PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 1664 wrote to memory of 2980 1664 cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe PID 2980 wrote to memory of 2712 2980 a1punf5t2of.exe a1punf5t2of.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe"C:\Users\Admin\AppData\Local\Temp\cd39d2bdf25946a72825af090e29f68643a77b5368bf67ebd7eb333edc40512f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD560fcb23bf855bb72fca05544f7637111
SHA107146374441ee8d69b7da76a03cb8a4e5721676f
SHA25666e4671cfb8b2c633826579769dee24ba4866b466d2905277515cdf4f0509661
SHA51269eebb4dc1efc2278e951c1ff2c9ee1d57cd94a194dcb3fb32ea47a2366d6a803adc8d2eb72fff653ef0f4b9a72572656eb09b6722159796c1d2e701a6421ae6