Overview
overview
10Static
static
7066d06ca00...81.exe
windows7-x64
1006d6f22d02...bc.exe
windows7-x64
809f1d49065...d1.exe
windows7-x64
10208cca124d...45.exe
windows7-x64
10241f67ece2...79.exe
windows7-x64
130616f6c48...60.exe
windows7-x64
1044f28cd6ea...7e.exe
windows7-x64
34b190a407b...5f.exe
windows7-x64
1072ddceebe7...6b.exe
windows7-x64
97b53a00b3a...b2.exe
windows7-x64
77cf39ebb44...57.exe
windows7-x64
108c42a08427...51.exe
windows7-x64
79d081b734c...91.exe
windows7-x64
4b25cc31472...15.exe
windows7-x64
10b2ec72de35...8f.exe
windows7-x64
6b4c2ffccfe...dd.exe
windows7-x64
5bab7af3306...be.exe
windows7-x64
9c531015ec0...86.exe
windows7-x64
8dc7ab2e7ed...60.exe
windows7-x64
8debfd1fb34...d8.exe
windows7-x64
8df36e2aaae...37.exe
windows7-x64
9df99316e57...27.exe
windows7-x64
4e60fc4473a...60.exe
windows7-x64
10Analysis
-
max time kernel
1200s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 19:27
Behavioral task
behavioral1
Sample
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06d6f22d02443afd6d6880ead6648ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
09f1d49065108a595578ff86ff63a514d47d5496ab5c23f38cda1f0d57dd6cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
208cca124ddafe35a122f6bdd36191151a2730b4e1051804d5f68d0cb4b44145.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
241f67ece26c9e6047bb1a9fc60bf7c45a23ea1a2bb08a1617a385c71d008d79.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
30616f6c488fa16ccdcbfd6273e7ac8604c82bc1468fc1a70b2a43661b674760.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b190a407bca89dd4778afa551bdc58dddff26fc5fe7622453e836ecdfaf565f.exe
Resource
win7-20240729-en
Behavioral task
behavioral9
Sample
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7b53a00b3a8859755f6144cb2149673fa17fdd6e439cbfdee21a7a513e6395b2.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
8c42a084278ff8e25f7ee765c37da84da02780da725505108f9eb39cfb05c051.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
9d081b734c595a1ae38e254369c0060c5870ee119c9f7853989c23ebc204a291.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
b2ec72de3543060f0f3af322c4f1caf2d65fa8ff56b5a93a5e8fa59c191d178f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
dc7ab2e7ed26554a11da51a184e95b01e685b1a2f99c7fc77d54d5966530bf60.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
df36e2aaae85f07851810a829e38a82827252fda15d4c4410da085d59ce38737.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
df99316e57002298d88be785acad4c3a900cbc5e04a29e32d4549f25f08a7527.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60.exe
Resource
win7-20241010-en
General
-
Target
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
-
Size
808KB
-
MD5
e49c40f6a69af400f2e11dd8fe6604dd
-
SHA1
56107d38cc5a94c67bdb92aa7566768b8e82b1f2
-
SHA256
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd
-
SHA512
80f782bf58a405559a1140be30838b7d46ddca5423d9001cb1f87005e0e46e2a6e20ae3229bd095e86d8f2fbc30020a7be8f08c7f47f095247168424b2412e28
-
SSDEEP
12288:oTsKNGpaBPxBlvdtsYuj+Ue8vQjY7heDHcMicoXfC/ye:YNG+PxvU3tvQweDHydqJ
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exedescription ioc process File created C:\Windows\SysWOW64\kernel32.dlI b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe File opened for modification C:\Windows\SysWOW64\kernel32.dlI b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe -
Modifies registry class 7 IoCs
Processes:
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dlI b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dlI\ = "dlIfile" b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dlIfile\shell\open\command b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dlIfile b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dlIfile\shell b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dlIfile\shell\open b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dlIfile\shell\open\command\ = "%1" b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exepid process 2784 b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe"C:\Users\Admin\AppData\Local\Temp\b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2784