Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
41589419116464448286035679864158972845276735013687.exe
Resource
win7-20240729-en
General
-
Target
41589419116464448286035679864158972845276735013687.exe
-
Size
2.7MB
-
MD5
b00ececc12e8dedbe256613f1b945b23
-
SHA1
97cb8249006a80e0773bb3aaba631171715ffcd4
-
SHA256
87768a35d6a9b73f30d4d4adcd96b8c4cca695dec762fe7962859972fbd75e56
-
SHA512
afd4ea1986da088c3f4c2757baeb4b21b14bd4b5e22e00260eca7e719c8fc78d803443b9dfc457799ab7b2d7d306395fbd48bf9d1bde260106a7ad3038c93d97
-
SSDEEP
49152:9wREDDM04bCaLjmFy1nOFPG/3E1/4BtkMgHeXDREnz+d:9wREsbCaLaeO2EJSkTs0+d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2628 41589419116464448286035679864158972845276735013687.tmp 2684 41589419116464448286035679864158972845276735013687.tmp -
Loads dropped DLL 3 IoCs
pid Process 1040 41589419116464448286035679864158972845276735013687.exe 2600 41589419116464448286035679864158972845276735013687.exe 2808 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41589419116464448286035679864158972845276735013687.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2680 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 41589419116464448286035679864158972845276735013687.tmp 2684 41589419116464448286035679864158972845276735013687.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 41589419116464448286035679864158972845276735013687.tmp -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 1040 wrote to memory of 2628 1040 41589419116464448286035679864158972845276735013687.exe 29 PID 2628 wrote to memory of 2556 2628 41589419116464448286035679864158972845276735013687.tmp 30 PID 2628 wrote to memory of 2556 2628 41589419116464448286035679864158972845276735013687.tmp 30 PID 2628 wrote to memory of 2556 2628 41589419116464448286035679864158972845276735013687.tmp 30 PID 2628 wrote to memory of 2556 2628 41589419116464448286035679864158972845276735013687.tmp 30 PID 2556 wrote to memory of 2680 2556 cmd.exe 32 PID 2556 wrote to memory of 2680 2556 cmd.exe 32 PID 2556 wrote to memory of 2680 2556 cmd.exe 32 PID 2556 wrote to memory of 2680 2556 cmd.exe 32 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2556 wrote to memory of 2600 2556 cmd.exe 33 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2600 wrote to memory of 2684 2600 41589419116464448286035679864158972845276735013687.exe 34 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35 PID 2684 wrote to memory of 2808 2684 41589419116464448286035679864158972845276735013687.tmp 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\is-S8B3F.tmp\41589419116464448286035679864158972845276735013687.tmp"C:\Users\Admin\AppData\Local\Temp\is-S8B3F.tmp\41589419116464448286035679864158972845276735013687.tmp" /SL5="$40114,1880700,795136,C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\timeout.exetimeout /T 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\is-7OT51.tmp\41589419116464448286035679864158972845276735013687.tmp"C:\Users\Admin\AppData\Local\Temp\is-7OT51.tmp\41589419116464448286035679864158972845276735013687.tmp" /SL5="$30184,1880700,795136,C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\CluelessStork.dll"6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD55d12e174483a3ffe2c2c500e307fdc8a
SHA1b32a8018e88633775bb9b6bd708ddce03699de37
SHA2562ae1ba32a40756b38d7544aff09b77e72c6cffdcaf05758fa7d3edd2d9b21f56
SHA51227453a456b36b8ad018dc8801cb28f08da89acc2c99b7f76f199ef9694f350810bfd404eda650e3eb889c9a7cf41e2117c66d30efb26ecfa80c094f353f4183e
-
Filesize
3.1MB
MD5e97363b64f37ee24cdd55cea14d1c564
SHA1dd82ae5ebf33348011b0437fe8107d4d72b9e2b9
SHA256ade1473799360f3df1cb0f8f20fa99e325009fb53e151236d0a2be6f041a8c8c
SHA512362bdf700ddd9186e9207351f0b8879f303c8c669b4bea2327ba549e18f7a333e11f4dc07cc2721ac18fdcdee04a8362ae6b4cdbdc961d220e154fa6de32182b