Analysis
-
max time kernel
85s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe
Resource
win10v2004-20241007-en
General
-
Target
b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe
-
Size
4.9MB
-
MD5
dce5078c6531df89e00e0d6d14d11140
-
SHA1
88c801c562ba841b4e5023689bdd0ae3fd358b60
-
SHA256
b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742
-
SHA512
8538e4b89134842827d9c9f8fc6f56d365c686725f844323afd76cb7a098dcd9469c2c83001cbebc218bd5c2866230d9a440005fa70f2b6de0a46f3924852f35
-
SSDEEP
98304:ijDGNIQJkgcV3dYZvjeV/NHJ7EfxOVuvcFyFi6I5Qw6ugBL4fbdUm8AMkz:qDYJgVSZ7eV/Y5oKUyIbdUm8mz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2596 2452 b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe 31 PID 2452 wrote to memory of 2596 2452 b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe 31 PID 2452 wrote to memory of 2596 2452 b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe 31 PID 2452 wrote to memory of 2596 2452 b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe 31 PID 2596 wrote to memory of 1944 2596 cmd.exe 33 PID 2596 wrote to memory of 1944 2596 cmd.exe 33 PID 2596 wrote to memory of 1944 2596 cmd.exe 33 PID 2596 wrote to memory of 1944 2596 cmd.exe 33 PID 2596 wrote to memory of 3016 2596 cmd.exe 34 PID 2596 wrote to memory of 3016 2596 cmd.exe 34 PID 2596 wrote to memory of 3016 2596 cmd.exe 34 PID 2596 wrote to memory of 3016 2596 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe"C:\Users\Admin\AppData\Local\Temp\b1cfee3f03ddded14695bda4b58538e9a7714ef1a144ad9948da3352dbdb6742N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.1.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\xcopy.exexcopy /c /e /r /y "┐¿╫Θ╝■╗π╫▄\*.*" "C:\Windows\SysWOW64\"3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1944
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /c /e /r /y "┐¿╫Θ╝■╗π╫▄\*.*" "C:\Windows\System32\"3⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD5a7932f3c367737058f3b9643a52adf03
SHA1baef725987873b962ec662794e5b4dd1dae6df58
SHA2564d37dbe1ed012afea7300772d10e2216da007323c7f6f4674e8c68cc2af8776b
SHA512ee8e32970b1f9d32343f182d3c5da7b4ce473d6fde5c52f50b8ea146f3105452c87a7a74aaed12b5de796a3b6c2e8e28604d1a712840b962e6ee3eb2764b9132