Analysis
-
max time kernel
149s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
TEKJ09876545678002.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TEKJ09876545678002.exe
Resource
win10v2004-20241007-en
General
-
Target
TEKJ09876545678002.exe
-
Size
1.3MB
-
MD5
8eefc053b6ed983bec5aff3dc3369b40
-
SHA1
84756cd09113665a8a8eba1d88da482bc276ada0
-
SHA256
49b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
-
SHA512
60c0ced29238693be0cc2f4e20d219b4326fc4499ee216ddeb993714cd1565718f1af32f7a1af459845bcc1cd11ee0469189d54da86ebda4be651b7c4ff9a283
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8aLvxFjSOLmYtDRqrHZAZsi+xX06kGGsFG40b:lTvC/MTQYxsWR7aL9LmkGAZsFX06e/
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\niellist.vbs niellist.exe -
Executes dropped EXE 1 IoCs
pid Process 3252 niellist.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023abf-5.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 764 3252 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TEKJ09876545678002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niellist.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3748 wrote to memory of 3252 3748 TEKJ09876545678002.exe 86 PID 3748 wrote to memory of 3252 3748 TEKJ09876545678002.exe 86 PID 3748 wrote to memory of 3252 3748 TEKJ09876545678002.exe 86 PID 3252 wrote to memory of 2616 3252 niellist.exe 87 PID 3252 wrote to memory of 2616 3252 niellist.exe 87 PID 3252 wrote to memory of 2616 3252 niellist.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\TEKJ09876545678002.exe"C:\Users\Admin\AppData\Local\Temp\TEKJ09876545678002.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\unprickled\niellist.exe"C:\Users\Admin\AppData\Local\Temp\TEKJ09876545678002.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\TEKJ09876545678002.exe"3⤵PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 6563⤵
- Program crash
PID:764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3252 -ip 32521⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD5ce97ecb907ae2832d39dfdf8658b1013
SHA11a866cf9f7c5e7af603bd5a6d2a798c728ba9318
SHA256d2614fb61d4ac6f80a1446da27e1fa01cdc8ea8385a694a4b0094130a1085d40
SHA51221bff4b301ac3192c7fb59363a367c59480af6bdbbdbbef0d2586208ea9e82975649718feb9ade75457871ce60836e2a092e6ecf45a0a2ec0fd0a7c26ccfd96c
-
Filesize
1.3MB
MD58eefc053b6ed983bec5aff3dc3369b40
SHA184756cd09113665a8a8eba1d88da482bc276ada0
SHA25649b3a5b9adc10281015d59ca3b9439cd1201712133895cb848d33c66c8fbb1bc
SHA51260c0ced29238693be0cc2f4e20d219b4326fc4499ee216ddeb993714cd1565718f1af32f7a1af459845bcc1cd11ee0469189d54da86ebda4be651b7c4ff9a283