Overview
overview
10Static
static
1048db28a1f4...c5.exe
windows7-x64
148db28a1f4...c5.exe
windows10-2004-x64
1595539b200...6e.exe
windows7-x64
7595539b200...6e.exe
windows10-2004-x64
7689ca565d8...33.exe
windows7-x64
7689ca565d8...33.exe
windows10-2004-x64
1079c92912e5...1e.exe
windows7-x64
179c92912e5...1e.exe
windows10-2004-x64
17c7a1691b4...c8.exe
windows7-x64
77c7a1691b4...c8.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 06:23
Behavioral task
behavioral1
Sample
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
Resource
win10v2004-20241007-en
General
-
Target
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
-
Size
3.9MB
-
MD5
c8420fe03d088ed9558dea175de7711f
-
SHA1
2feece2652375bee5171f31d10caf9ea4291ed36
-
SHA256
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8
-
SHA512
ef935456d3fd0a7f32b1abb8bfc2ccb9b37443835157f9b8805875fce15ab1b9ec1639253d6ec20b83dadae714531e49f6c26621fbb5ffca46af665a5df88a2a
-
SSDEEP
98304:rUg3G64EgdhTNuQmT19jSxkUDsY5HJFWHzFJkyTnIDQVVNdM8LtUIgCfhsT:lGNXNu/LjeOY5pFovkyTIDQs8LqIgCK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Setup.exepid Process 2692 Setup.exe -
Loads dropped DLL 1 IoCs
Processes:
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exepid Process 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exeSetup.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Setup.exepid Process 2692 Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exedescription pid Process procid_target PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30 PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30 PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30 PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30 PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30 PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30 PID 2668 wrote to memory of 2692 2668 7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe"C:\Users\Admin\AppData\Local\Temp\7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227B
MD5387fd915fa13d669dc58a84c88eaa943
SHA135745ce0cbabf6eecd6fe9719807ef95850ce150
SHA2560033c9906f7b33f25e12cee7d1e7e07163d509d4569dfd5175ca321587b7fe5b
SHA512c4e49cce74c81b0c020f28bc9806c118b4863dda464977379146bffc72cb1e9bea3492aed31f62f1499d8d778da676cf1154bc5176a974c46422eeb3a986e5af
-
Filesize
999KB
MD57940573022d81cbdb9c04a22f5d88ad5
SHA17352716c480ee92ab212bfcd2627f802d03907cc
SHA2563d413208468ad2a4a8f865ba41544ddad94b020084597ef971848425b38d3d14
SHA512df06e17515e3e3b1b2b97b49272dd69163fde07ae18ba49b86ae9f9c406b267bb152eaa0b325d044994c328627424b56e9e14948b7d3b93679b165062eeaf60b