Analysis
-
max time kernel
78s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe
Resource
win7-20240903-en
General
-
Target
451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe
-
Size
88KB
-
MD5
7dbc7d98f3a7392ea418dd7cdee549c0
-
SHA1
8050656fc3829b1014b53cab07ec5418d316a558
-
SHA256
451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547
-
SHA512
5bfeccb890dd4f3a189a0daa223b408362148be87e8703d2f4a559b2ec24e75b55b41b8df155450f27bde83001b5631612269e9901d433b625f8af513ed464ba
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEd:6D0ctAVA/bmxIMnoKjyR/Nd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 -
resource yara_rule behavioral1/memory/99868-540765-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99868-540764-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99868-540763-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99868-540760-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99868-540758-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31 PID 1732 wrote to memory of 99868 1732 451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe"C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe"C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe"2⤵
- System Location Discovery: System Language Discovery
PID:99868 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HYUWI.bat" "3⤵PID:98640
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵PID:98808
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵PID:98888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD536701de95c265cdae7b5218ea1963eb0
SHA10307b59f4ebdb72e7cc86eeaf06c07d08c5c4475
SHA256b4e82de08ec60debc576193354df9af3665f9e81036b5ce5f4e6dee46674309f
SHA5126de8cf4e53d22a4285ae39b65f857b9017bc685300245a2a3a91a23cabc3636b2741def6d526a7404b9333e4b74a72ccb2412438b7d4ec939e39effd63a81d19