Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 05:52
Behavioral task
behavioral1
Sample
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe
Resource
win7-20240903-en
General
-
Target
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe
-
Size
628KB
-
MD5
1952368f897c22bc2f4ecf319f7ff331
-
SHA1
b5ce26cd9b5086a1ed7c3a2ad160a52b74b0943d
-
SHA256
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
-
SHA512
43d35629cebd5e2cc450d48d2f12bc4a51dee0d3800a7c43e5ed9641162dca87141f083a19888042ea61092ac07f58979d4764ce420fd28867a34918a5ea8168
-
SSDEEP
12288:6Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiCQ6qLB4A0L7LdNOkcw4:6q5TfcdHj4fmb6vkCkt4
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\misruling.vbs misruling.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 misruling.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3224-13-0x0000000000B90000-0x0000000000CFB000-memory.dmp autoit_exe behavioral2/memory/3068-22-0x0000000000F70000-0x0000000001370000-memory.dmp autoit_exe behavioral2/memory/3068-25-0x0000000000CC0000-0x0000000000E2B000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/3224-0-0x0000000000B90000-0x0000000000CFB000-memory.dmp upx behavioral2/files/0x000d000000023b5c-11.dat upx behavioral2/memory/3068-14-0x0000000000CC0000-0x0000000000E2B000-memory.dmp upx behavioral2/memory/3224-13-0x0000000000B90000-0x0000000000CFB000-memory.dmp upx behavioral2/memory/3068-25-0x0000000000CC0000-0x0000000000E2B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1644 3068 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misruling.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 3068 misruling.exe 3068 misruling.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 3068 misruling.exe 3068 misruling.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3068 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 87 PID 3224 wrote to memory of 3068 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 87 PID 3224 wrote to memory of 3068 3224 c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe 87 PID 3068 wrote to memory of 2924 3068 misruling.exe 88 PID 3068 wrote to memory of 2924 3068 misruling.exe 88 PID 3068 wrote to memory of 2924 3068 misruling.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe"C:\Users\Admin\AppData\Local\Temp\c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Archimago\misruling.exe"C:\Users\Admin\AppData\Local\Temp\c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc.exe"3⤵PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 7243⤵
- Program crash
PID:1644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3068 -ip 30681⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
628KB
MD51952368f897c22bc2f4ecf319f7ff331
SHA1b5ce26cd9b5086a1ed7c3a2ad160a52b74b0943d
SHA256c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
SHA51243d35629cebd5e2cc450d48d2f12bc4a51dee0d3800a7c43e5ed9641162dca87141f083a19888042ea61092ac07f58979d4764ce420fd28867a34918a5ea8168