Analysis
-
max time kernel
95s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 09:43
Behavioral task
behavioral1
Sample
GD7656780000.bat.exe
Resource
win7-20240903-en
General
-
Target
GD7656780000.bat.exe
-
Size
628KB
-
MD5
1952368f897c22bc2f4ecf319f7ff331
-
SHA1
b5ce26cd9b5086a1ed7c3a2ad160a52b74b0943d
-
SHA256
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
-
SHA512
43d35629cebd5e2cc450d48d2f12bc4a51dee0d3800a7c43e5ed9641162dca87141f083a19888042ea61092ac07f58979d4764ce420fd28867a34918a5ea8168
-
SSDEEP
12288:6Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiCQ6qLB4A0L7LdNOkcw4:6q5TfcdHj4fmb6vkCkt4
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\misruling.vbs misruling.exe -
Executes dropped EXE 1 IoCs
pid Process 3320 misruling.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/208-14-0x0000000000BE0000-0x0000000000D4B000-memory.dmp autoit_exe behavioral2/memory/3320-25-0x0000000000970000-0x0000000000ADB000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/208-0-0x0000000000BE0000-0x0000000000D4B000-memory.dmp upx behavioral2/files/0x000a000000023b9c-10.dat upx behavioral2/memory/3320-12-0x0000000000970000-0x0000000000ADB000-memory.dmp upx behavioral2/memory/208-14-0x0000000000BE0000-0x0000000000D4B000-memory.dmp upx behavioral2/memory/3320-25-0x0000000000970000-0x0000000000ADB000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2928 3320 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misruling.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GD7656780000.bat.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 208 GD7656780000.bat.exe 208 GD7656780000.bat.exe 208 GD7656780000.bat.exe 3320 misruling.exe 3320 misruling.exe 3320 misruling.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 208 GD7656780000.bat.exe 208 GD7656780000.bat.exe 208 GD7656780000.bat.exe 3320 misruling.exe 3320 misruling.exe 3320 misruling.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 208 wrote to memory of 3320 208 GD7656780000.bat.exe 86 PID 208 wrote to memory of 3320 208 GD7656780000.bat.exe 86 PID 208 wrote to memory of 3320 208 GD7656780000.bat.exe 86 PID 3320 wrote to memory of 2444 3320 misruling.exe 89 PID 3320 wrote to memory of 2444 3320 misruling.exe 89 PID 3320 wrote to memory of 2444 3320 misruling.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Archimago\misruling.exe"C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"3⤵PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 7243⤵
- Program crash
PID:2928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3320 -ip 33201⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
628KB
MD51952368f897c22bc2f4ecf319f7ff331
SHA1b5ce26cd9b5086a1ed7c3a2ad160a52b74b0943d
SHA256c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
SHA51243d35629cebd5e2cc450d48d2f12bc4a51dee0d3800a7c43e5ed9641162dca87141f083a19888042ea61092ac07f58979d4764ce420fd28867a34918a5ea8168