Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 04:02
Static task
static1
Behavioral task
behavioral1
Sample
362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe
Resource
win10v2004-20241007-en
General
-
Target
362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe
-
Size
1.6MB
-
MD5
e7c9164ded4de1d5b33800bf17ab2ff0
-
SHA1
1a7c1734d6d2fcae7ef8de850fde8f7b0453d54d
-
SHA256
362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12e
-
SHA512
303aeb98f88388c56cdc1f907d99438fd1f8fe65903f8143d150c00fddd8cbccd30fb452405df2c23b8d93d164c578519fc90a9f9c25d3f2735b4cd20467c945
-
SSDEEP
12288:FS5O2oHOQsPmB73yWuPYHXDJB/g8buYR1wpoaanFC2oe6weFC9VfDPgnXPh8WiBJ:FS5O2oJB73yG/giR0oVye4ep6XOjmzh
Malware Config
Signatures
-
Imminent family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\file.exe" 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 System interrupts .exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini System interrupts .exe File opened for modification C:\Windows\assembly\Desktop.ini System interrupts .exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3388 set thread context of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly System interrupts .exe File created C:\Windows\assembly\Desktop.ini System interrupts .exe File opened for modification C:\Windows\assembly\Desktop.ini System interrupts .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System interrupts .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3308 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3604 System interrupts .exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe Token: SeDebugPrivilege 3604 System interrupts .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3604 System interrupts .exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4392 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 86 PID 3388 wrote to memory of 4392 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 86 PID 3388 wrote to memory of 4392 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 86 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 3388 wrote to memory of 3604 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 88 PID 4392 wrote to memory of 2164 4392 cmd.exe 89 PID 4392 wrote to memory of 2164 4392 cmd.exe 89 PID 4392 wrote to memory of 2164 4392 cmd.exe 89 PID 2164 wrote to memory of 2384 2164 wscript.exe 90 PID 2164 wrote to memory of 2384 2164 wscript.exe 90 PID 2164 wrote to memory of 2384 2164 wscript.exe 90 PID 3388 wrote to memory of 3968 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 109 PID 3388 wrote to memory of 3968 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 109 PID 3388 wrote to memory of 3968 3388 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe 109 PID 3968 wrote to memory of 3308 3968 cmd.exe 111 PID 3968 wrote to memory of 3308 3968 cmd.exe 111 PID 3968 wrote to memory of 3308 3968 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe"C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderName\mata.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs" "C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
-
C:\Users\Admin\AppData\Roaming\System interrupts .exe"C:\Users\Admin\AppData\Roaming\System interrupts .exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FolderName\stres.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
75B
MD5b33985e3fc0ff1814a70626c744d2fd9
SHA1269ff1b7ff5510822cd5207ca8593e48672d7431
SHA256b4a06f7d7c2b2887801515c8f0cdc7a4cf8245af5afa38314f72952bd18fb357
SHA512689de361836ff6053e2f0c88942e0b7ac62a3cbc8e8ef923d49c6e84e4c28e65c11588b6d88b69abad86e06d5eb22586d22cafe1abff1ceb6e0fc0d930a97769
-
Filesize
77B
MD5a557a61b017faddffbf634b01b09afa2
SHA1324addd96cc2878fe77c1de25fa59b90afa81172
SHA2569d605915f3bfafc681b550536c203f51698b695dcf1b44f991f517cfa2bc85aa
SHA5120666502bac0b965c4bc0fa6f7e360c9ca44df50a5fb85a0754d8db534a7db85297ae1654207b9fe16b8525603fefa8ddb96a792da30f0846af38266fbb2a9178
-
Filesize
1.6MB
MD5e7c9164ded4de1d5b33800bf17ab2ff0
SHA11a7c1734d6d2fcae7ef8de850fde8f7b0453d54d
SHA256362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12e
SHA512303aeb98f88388c56cdc1f907d99438fd1f8fe65903f8143d150c00fddd8cbccd30fb452405df2c23b8d93d164c578519fc90a9f9c25d3f2735b4cd20467c945
-
Filesize
228B
MD5e832589ab098b4e9894b27f3f37d97fb
SHA1d379434086919ff1a1f369feaffe56c45ab0b6c6
SHA256718e1e8c2c7c0d0ff617b11fef703affe7818e82d6aad2d84982d1200742a62a
SHA5121d0b0dc46d361b0f2c221bbd5092cd42d5a504f88c4e982ff93663a84b2f149f7b56fce9cceef26c9fea6d5e9b658f6cee016185a1f6c7a7419bd7f4391940e5
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479