Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/11/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe
Resource
win10v2004-20241007-en
General
-
Target
5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe
-
Size
611KB
-
MD5
30a6977a4b687df2b639f3c7106be3d2
-
SHA1
3910d59ccfb813c85c8b3f60c499d88c529bb504
-
SHA256
5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff
-
SHA512
dd9b1b01bd902b7ed222d47f7d59bb0a09ce1f4cb3fcc4250231f9500e98c3916697c3ab9bf9c10cfc1430f3474e364d94d583364c5ad804505c52ecd818eb5a
-
SSDEEP
12288:igqwEHlsnrrsZNQiHCkT2VHKj3aaR5Pd4wKNbEt8LF+mbHy:eHCkT/jKaR5V4bY8X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2668 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 31 PID 2596 wrote to memory of 2668 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 31 PID 2596 wrote to memory of 2668 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 31 PID 2596 wrote to memory of 2668 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 31 PID 2596 wrote to memory of 2648 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 33 PID 2596 wrote to memory of 2648 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 33 PID 2596 wrote to memory of 2648 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 33 PID 2596 wrote to memory of 2648 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 33 PID 2596 wrote to memory of 2804 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 34 PID 2596 wrote to memory of 2804 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 34 PID 2596 wrote to memory of 2804 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 34 PID 2596 wrote to memory of 2804 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 34 PID 2596 wrote to memory of 2520 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 35 PID 2596 wrote to memory of 2520 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 35 PID 2596 wrote to memory of 2520 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 35 PID 2596 wrote to memory of 2520 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 35 PID 2596 wrote to memory of 2756 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 36 PID 2596 wrote to memory of 2756 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 36 PID 2596 wrote to memory of 2756 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 36 PID 2596 wrote to memory of 2756 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 36 PID 2596 wrote to memory of 2936 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 37 PID 2596 wrote to memory of 2936 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 37 PID 2596 wrote to memory of 2936 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 37 PID 2596 wrote to memory of 2936 2596 5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bzCyhj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp57C1.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"{path}"2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"{path}"2⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"{path}"2⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"{path}"2⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\5a5d5a62a374bf9f74ee88b0214c358e9bcc7f0fe98d85beb1cb2a8bf06f7cff.exe"{path}"2⤵PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56b1ea4c1b007b6a8b57d13fe21c93be3
SHA19ef4b9bf8b9a9f90af83ca345cfe2480ada227d4
SHA2568653231b60382f9fa9eb6e4b92a59b310e09e6d38d048096766e09b3106d8088
SHA512d4cc90705937549373177b0bbb6978fd77bf4de0caf11bfafacf149949991249a8d45b626ef835996a7c5842de9cdc0cb3a63b71f9c9d3ad1f3e8af49249b255