Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win7-20240729-en
General
-
Target
41589419116464448286035679864158972845276735013687.exe
-
Size
2.7MB
-
MD5
b00ececc12e8dedbe256613f1b945b23
-
SHA1
97cb8249006a80e0773bb3aaba631171715ffcd4
-
SHA256
87768a35d6a9b73f30d4d4adcd96b8c4cca695dec762fe7962859972fbd75e56
-
SHA512
afd4ea1986da088c3f4c2757baeb4b21b14bd4b5e22e00260eca7e719c8fc78d803443b9dfc457799ab7b2d7d306395fbd48bf9d1bde260106a7ad3038c93d97
-
SSDEEP
49152:9wREDDM04bCaLjmFy1nOFPG/3E1/4BtkMgHeXDREnz+d:9wREsbCaLaeO2EJSkTs0+d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
41589419116464448286035679864158972845276735013687.tmp41589419116464448286035679864158972845276735013687.tmppid process 2968 41589419116464448286035679864158972845276735013687.tmp 2700 41589419116464448286035679864158972845276735013687.tmp -
Loads dropped DLL 3 IoCs
Processes:
41589419116464448286035679864158972845276735013687.exe41589419116464448286035679864158972845276735013687.exeregsvr32.exepid process 2052 41589419116464448286035679864158972845276735013687.exe 2108 41589419116464448286035679864158972845276735013687.exe 2740 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
41589419116464448286035679864158972845276735013687.exe41589419116464448286035679864158972845276735013687.tmpregsvr32.exe41589419116464448286035679864158972845276735013687.exe41589419116464448286035679864158972845276735013687.tmpcmd.exetimeout.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1280 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
41589419116464448286035679864158972845276735013687.tmppid process 2700 41589419116464448286035679864158972845276735013687.tmp 2700 41589419116464448286035679864158972845276735013687.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
41589419116464448286035679864158972845276735013687.tmppid process 2700 41589419116464448286035679864158972845276735013687.tmp -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
41589419116464448286035679864158972845276735013687.exe41589419116464448286035679864158972845276735013687.tmpcmd.exe41589419116464448286035679864158972845276735013687.exe41589419116464448286035679864158972845276735013687.tmpdescription pid process target process PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2052 wrote to memory of 2968 2052 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2968 wrote to memory of 3032 2968 41589419116464448286035679864158972845276735013687.tmp cmd.exe PID 2968 wrote to memory of 3032 2968 41589419116464448286035679864158972845276735013687.tmp cmd.exe PID 2968 wrote to memory of 3032 2968 41589419116464448286035679864158972845276735013687.tmp cmd.exe PID 2968 wrote to memory of 3032 2968 41589419116464448286035679864158972845276735013687.tmp cmd.exe PID 3032 wrote to memory of 1280 3032 cmd.exe timeout.exe PID 3032 wrote to memory of 1280 3032 cmd.exe timeout.exe PID 3032 wrote to memory of 1280 3032 cmd.exe timeout.exe PID 3032 wrote to memory of 1280 3032 cmd.exe timeout.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 3032 wrote to memory of 2108 3032 cmd.exe 41589419116464448286035679864158972845276735013687.exe PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2108 wrote to memory of 2700 2108 41589419116464448286035679864158972845276735013687.exe 41589419116464448286035679864158972845276735013687.tmp PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe PID 2700 wrote to memory of 2740 2700 41589419116464448286035679864158972845276735013687.tmp regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\is-NSSG9.tmp\41589419116464448286035679864158972845276735013687.tmp"C:\Users\Admin\AppData\Local\Temp\is-NSSG9.tmp\41589419116464448286035679864158972845276735013687.tmp" /SL5="$40150,1880700,795136,C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\timeout.exetimeout /T 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\is-K3LS0.tmp\41589419116464448286035679864158972845276735013687.tmp"C:\Users\Admin\AppData\Local\Temp\is-K3LS0.tmp\41589419116464448286035679864158972845276735013687.tmp" /SL5="$301D8,1880700,795136,C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\CluelessStork.dll"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD55d12e174483a3ffe2c2c500e307fdc8a
SHA1b32a8018e88633775bb9b6bd708ddce03699de37
SHA2562ae1ba32a40756b38d7544aff09b77e72c6cffdcaf05758fa7d3edd2d9b21f56
SHA51227453a456b36b8ad018dc8801cb28f08da89acc2c99b7f76f199ef9694f350810bfd404eda650e3eb889c9a7cf41e2117c66d30efb26ecfa80c094f353f4183e
-
Filesize
3.1MB
MD5e97363b64f37ee24cdd55cea14d1c564
SHA1dd82ae5ebf33348011b0437fe8107d4d72b9e2b9
SHA256ade1473799360f3df1cb0f8f20fa99e325009fb53e151236d0a2be6f041a8c8c
SHA512362bdf700ddd9186e9207351f0b8879f303c8c669b4bea2327ba549e18f7a333e11f4dc07cc2721ac18fdcdee04a8362ae6b4cdbdc961d220e154fa6de32182b