Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe
Resource
win7-20240903-en
General
-
Target
1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe
-
Size
416KB
-
MD5
cb0d2b0ef0a02a1c2e18430edb08c5b0
-
SHA1
9b809bd44ba216096f8b1ea43a391044454129f1
-
SHA256
1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87
-
SHA512
88ca7b2f63ff412a97614a2812387bb162350b2edc9e9869bfc27172629b88e5cd5dd1c3ceb05f0f0827c37422a189564ce8cacf79519c202b7ecf56a6f6cbb2
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7o:ITNYrnE3bm/CiejewY5vb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1812 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 1144 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1812 1144 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe 30 PID 1144 wrote to memory of 1812 1144 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe 30 PID 1144 wrote to memory of 1812 1144 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe 30 PID 1144 wrote to memory of 1812 1144 1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe 30 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31 PID 1812 wrote to memory of 2476 1812 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe"C:\Users\Admin\AppData\Local\Temp\1960af0490edb6211dd26430ef1c375dc708a25cff2bf9792b7fd2760184eb87N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5c911d295c036a4b2740dad763d3b1319
SHA1106b9b23dba16233f92e2834ed131090729a017f
SHA25636833f9c9b640e1a2c1d08e1186f13d10298ab0000273f47de75a18134ec7ace
SHA512fbc2ce26c74b5ea634145148332426ad438cae2f45c08eb41251300139d7c2c43e8b1f51552bea411fc5eb80df4960979b025bf13c76052d17b5364ef600b256