Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe
Resource
win10v2004-20241007-en
General
-
Target
df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe
-
Size
146KB
-
MD5
3b27e5c91399bfd055d362558493b940
-
SHA1
58d6323b4e7f3d9ede0b31515813dc329f6e1e15
-
SHA256
df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378
-
SHA512
fa4a2e6a1690922277e71a7cfef2342abe0796fd0d9241db4a1f3f4fc09148c22157b161a5246effa608939b1f63c03f044680a391adef465a9842f5008537ab
-
SSDEEP
768:uQxKb3Lm5JOgqtMAyskynptyuz0ssoExjWRb3OgqtMAyskynptyuz0ssoExjWRMr:hgbbmDORyepWDoT93ORyepWDoTCbf
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2824 dota2installer.exe 1016 dota2installer.tmp -
Loads dropped DLL 4 IoCs
pid Process 2084 cmd.exe 2824 dota2installer.exe 2824 dota2installer.exe 2824 dota2installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dota2installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dota2installer.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "62" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "89" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "104" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "104" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "9" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "12" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "0" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "0" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "41" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "41" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\NumberOfSubdomains = "1" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "9" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "12" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "104" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "62" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "41" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "62" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\ = "89" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\83.136.232.242\Total = "89" df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1016 dota2installer.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2472 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 32 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2064 wrote to memory of 2084 2064 df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe 34 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2084 wrote to memory of 2824 2084 cmd.exe 36 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37 PID 2824 wrote to memory of 1016 2824 dota2installer.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe"C:\Users\Admin\AppData\Local\Temp\df7304888727550298299d7fda792b1ffa14a1512a3afd86e62b2a269daa4378.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move /y "dota2installer.exe" "%temp%\dota2installer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" /wait "%temp%\dota2installer.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\dota2installer.exe"C:\Users\Admin\AppData\Local\Temp\dota2installer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\is-G07PR.tmp\dota2installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-G07PR.tmp\dota2installer.tmp" /SL5="$901B0,1307637,843264,C:\Users\Admin\AppData\Local\Temp\dota2installer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1016
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
174B
MD556de379172b1ee469d2e8ff111ebf32e
SHA1576db33ff8a6a2c0f1694c97a62706d0dcb827c9
SHA2561afe7d3f1797f76099370422a1724db0452ef4c81c89745193ffdce972f09d9d
SHA5126db49d91d45e569ec51f068df5d3c9fb428b3875eeb53c391c86e959471601077a5a9c2d5dd6e9700f09d298320b6e155d5267e9ce706777257161b487cac5d6
-
Filesize
352B
MD59ae06b10f93691884e852a2c7c6352c4
SHA15b3f617a61b091aeb77a0c9216e2f9410c4faec3
SHA256a78600cc952c8170c478659d73baadc9a672e87466952d4648265a5f91e0856f
SHA5129587d6b040cbdff97e047fb09ebc5025c7e0833c8da67f54670aedc3913f246bd5fbece964577258ff9e926ac090ddc5bc77cd9a5b1d5c6bcb3e4856ea61a8a7
-
Filesize
2.1MB
MD5d758c71f256811cc3f66a379fc72f55b
SHA17b7de84121351d1946fe88d4d86a11ca5ccbc6aa
SHA2567143b3d95c2463346c84e91e25e5dc153afcb0c9825ecd6948d706532caed45f
SHA512723ea81cab9975f8d870dcf013859a38a55849c9158529db72912f9e643542a10bc4e812fbe247f43545795270ed07dcccc1e2e0a0c8fcee4b1259a492cf8cf7
-
Filesize
3.0MB
MD511b718367c4b512db2353acc9427c873
SHA1473aefef52aa3a690552eaed6e3c27b9b68b7e1c
SHA2569116ff47d43d1eecee3bfcc9f295045e60e63ad861f779b481ca6a6d87efe021
SHA512260db0fc8ef46f8f6594036cad95ab04b8860c138d35c428a54c02fd30ca09734209f8ce98458bd1dca5ccd4519999a939748525c6910b54f2f396a707d94028