Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe
Resource
win10v2004-20241007-en
General
-
Target
357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe
-
Size
6.1MB
-
MD5
dffb0716dcdff5df4aee800f37e997d0
-
SHA1
b8d839bf6f74a23ff5400ca55ff8c30e14065a37
-
SHA256
357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263
-
SHA512
979777eaea6792816c429cfbe928cce837f9216a135cf6b824fa248817baf35f0df53ee971b03d1734efa92db88e37570690d092071e91752a40cfe4db054577
-
SSDEEP
98304:sMDtIXLr06AdfEThF35PzuY+NmU7afvNN5+N6F8c5AvtfXmJ+PigmgI:UrmEdF3D+NmcaNNH8UotnmJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2640 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe -
Loads dropped DLL 3 IoCs
pid Process 2936 cmd.exe 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2876 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 2804 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2336 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 30 PID 1908 wrote to memory of 2336 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 30 PID 1908 wrote to memory of 2336 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 30 PID 1908 wrote to memory of 2336 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 30 PID 1908 wrote to memory of 2936 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 32 PID 1908 wrote to memory of 2936 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 32 PID 1908 wrote to memory of 2936 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 32 PID 1908 wrote to memory of 2936 1908 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 32 PID 2336 wrote to memory of 2356 2336 cmd.exe 34 PID 2336 wrote to memory of 2356 2336 cmd.exe 34 PID 2336 wrote to memory of 2356 2336 cmd.exe 34 PID 2336 wrote to memory of 2356 2336 cmd.exe 34 PID 2936 wrote to memory of 2716 2936 cmd.exe 35 PID 2936 wrote to memory of 2716 2936 cmd.exe 35 PID 2936 wrote to memory of 2716 2936 cmd.exe 35 PID 2936 wrote to memory of 2716 2936 cmd.exe 35 PID 2336 wrote to memory of 2736 2336 cmd.exe 36 PID 2336 wrote to memory of 2736 2336 cmd.exe 36 PID 2336 wrote to memory of 2736 2336 cmd.exe 36 PID 2336 wrote to memory of 2736 2336 cmd.exe 36 PID 2936 wrote to memory of 2856 2936 cmd.exe 37 PID 2936 wrote to memory of 2856 2936 cmd.exe 37 PID 2936 wrote to memory of 2856 2936 cmd.exe 37 PID 2936 wrote to memory of 2856 2936 cmd.exe 37 PID 2936 wrote to memory of 2876 2936 cmd.exe 38 PID 2936 wrote to memory of 2876 2936 cmd.exe 38 PID 2936 wrote to memory of 2876 2936 cmd.exe 38 PID 2936 wrote to memory of 2876 2936 cmd.exe 38 PID 2856 wrote to memory of 2640 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 39 PID 2856 wrote to memory of 2640 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 39 PID 2856 wrote to memory of 2640 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 39 PID 2856 wrote to memory of 2640 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 39 PID 2856 wrote to memory of 2804 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 40 PID 2856 wrote to memory of 2804 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 40 PID 2856 wrote to memory of 2804 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 40 PID 2856 wrote to memory of 2804 2856 357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe"C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zbe2024111617111375.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\schtasks.exeSchtasks.Exe /delete /tn "Maintenance" /f3⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\schtasks.exeSchtasks.Exe /create /tn "Maintenance" /xml "C:\Users\Admin\AppData\Local\Temp\zx2024111617111375.xml"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zb2024111617111375.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe"C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe"C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe" --local-service4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe"C:\Users\Admin\AppData\Local\Temp\357e3abea9aff0d903bb909c2a4fc9a65589713f883f68067d65926dda1d2263N.exe" --local-control4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2804
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
764B
MD55edeef31bf2cf763b76b9a3e8badc624
SHA1375fca10196000050045eaaa263fdef2f269bfb5
SHA256707bab3ad9195cd51e975d1ee4b70484f1af3e9d78ffcc6710bb976c37af36ae
SHA512d4a5865a651d739ce2894237d3c827c89b114ef35c7eb0a9109b8cfc00dd8a02bd4c6acf9549e8b4a3e7af45513079e9853eb7f80ba97dc5e80ca6e8d59d7bb6
-
Filesize
304B
MD5cb71d7e29f3fc95d814516e2a8c54dab
SHA137e940df03e1e8f472664ee3f7d78b7422fcd5dd
SHA2568bf4b141a3f9710023444583e2a96a533094c86fd4086ca1b422f0929d192b0d
SHA512581954a02a9c1843b99e947f924bae5e6ae588fb9f263b8c9a1245799b1aa4472ff820b7ff476fc8e552cf85745e6803b3a9ab80af716db5d71bcfe7328f7638
-
Filesize
6.1MB
MD5c202c488dd8b99f698723ea426e9b084
SHA1f419630cb2753a7c9a22572ca763c2eca94aa9ae
SHA256dce373f2b8fd1aa1665b3bb59127e0773f83b13f8b81e5a5b26c514970bfbe07
SHA512f7fe9be7b55c1e447cbb2a5289c41383b4ac453eed27b365d194aec2fc71a9f696b9aaa58ddf569021a5a24e1b82ed31dc25d0475c6d61bb57e18fe2223fdcd2
-
Filesize
1KB
MD5751ac25b82959df46b8bab595d8b8ef4
SHA1311bc2338b21db0aec0022ca5ff90947b4c0fd63
SHA2563afc514c85c441d59bf449e63510becd27395f4ac3ad720552e78c2565c18190
SHA51208bf85f575b715e02d1540e3a97222bd436346b445977634e327dff288c4e6916554e761c48de07c8b76b3fa3cdabf32c25508c2e335e6f069d9fbb8a0d62506
-
Filesize
6KB
MD589768de262fdaf321da3d83f0c8f4ce4
SHA1a312a6e055b6320f4a1b8e562f8cc05558e123c4
SHA2562700bafc9acd15043713862a20233ca7f610bc064b5ec2af25fefa89474c888a
SHA512b58079574385839d66952c10d6108f6eda05af07477b1cc299971b50665c3ffd666e3f83fe0dc277fd41c9792efc8aa6ec6fb2c39b66c965b2b45f057cb099f7
-
Filesize
9KB
MD5a5b897a53dcd64acc00c439a5fae9609
SHA1b4c193a38c00b98b20f31d302b953537912c0d26
SHA256936785bce1856a1fcbaea3d97130b7eeb58bf76a7214ae2afd9bf5ceb859b2ec
SHA51290d2321f7c12a49ed76e5c70475cac30772752b019c30b3c78e4afed7f89fe7c724c1cb6b2d42472d711dba1a73bc493a7d97eafbc1dcfd3366db59342ef06e9
-
Filesize
2KB
MD5f04ef78435b8576e748f319ba45cd866
SHA1c96247f9c889df772e273d5a200ace9b7367e2a4
SHA256b6fb93ebb2b43fd5d0ca5631dab51832c1f2d2eb3487e22b27d8b9e07c171285
SHA512147b69be10a900c86399357fe5cf1445692925b7d9327957aa430966c39c44d031caa6532398b65271bc6ae8df85edd969e3e98c2af70c6b13f77af64816242a
-
Filesize
2KB
MD5fdb6719914dbfa567e4f006683e6ccd3
SHA11c7d529203a425a4d10c827ef76173613692cccb
SHA25628598f70eae1362a6dbe2c5b66fdf83929d7941c50128d934370fdbc5355fc2b
SHA5123488c2e0ceaff4eb4e8b90a01aa42718dbe840bb94486d4f7b0f0051c965ab658b16ea52a4716d4774659b11092a398a36103519fc5cc7c98749ebdf44c8fc90
-
Filesize
2KB
MD55095072b5449f43e269194fd81827dfb
SHA1d75cf12d97bb6da23c0e8ccaea418a3b582108de
SHA25654acd1792c4fd0791847e97b4cfb826c75ade3848c17ee576491f0c82280d35b
SHA512db7cbfbd798ff89cf4e97469ff5da5fb6d2536baa63e1e1e057e1e77a974a2281dff01fbd5409a82a331252564d86a1a29459698c0ae2485ac8e8d2273a09787
-
Filesize
681B
MD505d1791acc073896bdd78e86e4354412
SHA191ffdc92b0f463b2026d9a8608b76cb7f8c6fb3b
SHA2567f7f4f69073cf016461d945c6d3e65a04796e1d55d8ad6e4634e767162a6d5fe
SHA51287a31ef0b939b8d0e2575d475f980b405dbc2a6f6899d71e50b12481a6456fb5beaf6d99ce528620107e5e2013abd9fc47b85b388f8880c5d5d54cb62df4ed05
-
Filesize
738B
MD55a3002b1c965a55f16256923db04b0b0
SHA15d64c278b8a35f75313ef84d9a9018cc225c971f
SHA25632507ab02012e49cc52bc7633f25f05613a4a2288bc881bf39a0f34c9ea1b7b7
SHA512a6759197cc603e974ed1a54d2393f2b4678d97c79ee3dd9d22dc440bdd37c2cee5d59a117df5ff5db61e0573723aef61f1bc36d75c90184ab9cb17c90bf7a343
-
Filesize
785B
MD54382ac964e8c7ff045ddfb6269948655
SHA14d5af43a659a941f8ed7486ae41b13907c124eda
SHA25614513c1d23752bf1f27cb716172ac447db1e346d1a791d36aa216c9e5e4af7c5
SHA512aeb77dfc1d6a4ef13d4966c5ae1c3fedd91868d107b84060851a681ce63ce328245143051b4b089f97d995733f72f87677d87cecfae7769b55ebdb614a4108a4
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD5a3c441dd09a9c3f637838b1e4fdc89c7
SHA118b7f4868217d0a18a282bdb9325a2382a08df19
SHA256bd53b58652faed01e0ce2313698ecb0252400ef098a09c06b44ad82a76382e65
SHA512c638849de3cce0c3cde2e93f59f7d3378e1e7b26d051f9c1e598b8e1c9611e7ae3b2e2ab380303a0471910c73599fe3826d870b8df821e06a28e20e776bbb9f7
-
Filesize
1KB
MD5d29a6d940105750073fa9b92d3660c15
SHA1106d7993da0394094950acc5f14636f71aa2b63e
SHA2561d65346f54c30bc71ffad97bf7c965a3a69987fd1b71cbf075a42016ce1718fe
SHA512ef1d2199cad3a53c784bc8c586aaff7fe14cacd34fbbfdacc3f6f588342381c67d085e081e73f0d5dd9ac398a7b617254532eb859e3d36849448f1daf2d575bf
-
Filesize
2KB
MD50f85a9167875fc0b74fff184b9afa0e4
SHA13040a40845a29259efb793021c70dc34ad9a148a
SHA256f0cdaf34a318c2373fb2bc0de9d101ec2bab9fec36db8560dc4db36f1e53cf17
SHA51247b09bc7a3f2697c09e42afda7f422c60cce2d36a86c0e24f1978667a0cd93796b50fb655f521ab7737820b1794f0fec675293afc559bf74ffb1e4a5f3495b55
-
Filesize
2KB
MD51c1585f319372e5bcd67fa02ff947bbf
SHA1dce05357a807985a4e2b411dbc7f4d9b4600fcac
SHA25675e5127a362da23ec5c91d66f2bf827590494c99ad01d7bdfc68a676c8b23c66
SHA512002d44eb6f4d3b788340509af2218c177b7acfcf694c4c7981be61bcbd6c46bb065fb4a7ad6c2869e3997b516d3c6ac32c4bccf9fc093276c163fb239781e850
-
Filesize
6KB
MD5df6eb32d70110e58e7867cd717c7707d
SHA10694413efc84bab1ce1476bab8cde94366499c08
SHA2568cfa39020c3a7c1ef70ece4ee020857136f14650e8ddbc47cac4df3671f753e7
SHA512244100e0e10e6d63dcd7358e592ba7bfb4f5e3e4d6bb0b30f222794e37c79bc9205637d1cd49da3e754278b097b0b4b88a6aded50d1846def72dbd0294903905
-
Filesize
6KB
MD5a60cfb31df63d4236164f0459fa545d5
SHA13fdfc47ee5302e798079629b0e1b4227b388603d
SHA25645d0ec854cfa06ae133b1a9de37690844c2facf36836343d407b6abac40dc356
SHA5125b05387d9bc3223fed4265e4f6c7a31b577998bab0a8e6feaa09c05f63bff8fc3b31ce89aa15b8c39a735c921c86a53dac0bbf168b942a03d47a7fe1d51ce272
-
Filesize
6KB
MD5c386ff6ff901626e0a40b14c448a8bf3
SHA1b52a542deeec3f72e65df79b529215da99e6b342
SHA2564612c014d4045c1b3b2ecb65912909b7ee89f3b2f258ef7b03b809a6f4a2945c
SHA512f0f8639106df996f8d1005ec91b6072d6b491f42b0a9f52fd74b65963e183646ed8d9cc5a3a56102671d3061d1041bbcbf6d88818d49d86770607f62825d790c
-
Filesize
1KB
MD50ecef3539ebbbd22eb492abf3e976249
SHA1d891d7b340f5fd3f035424348e1f049df011c41e
SHA2565adb36814792f782b77af91ca815c069b6d229ca07c2ac8b07d7ec849e642a18
SHA5123d853c67a9d4383595f38de27f8be9848a50d2577b26b26dbb7f6ca133e9b6bd4d2a4362a2962579043ce2fb8e81b94987392ae7c69164e6f5a84b2e58ddc4b3
-
Filesize
1KB
MD5cbf068ad9f612be43bf1d0f9afeccab8
SHA1a4ecefcacda30e3601f23ea466f274b0fbfccfe3
SHA256fc655c45474daa6910388b09c78e01023a68d302de302f9e1cb12d7ddcc2fccf
SHA5127021d445bb3eb8b16bc4b4cf0dc169af82024a9c41aecc70a1f68c962bd96c179bd0d11fd26278fcc13ec7fcbf8ec54a13789c6b0de2140de12ccb01cad05656