Analysis
-
max time kernel
114s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:53
Behavioral task
behavioral1
Sample
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
Resource
win10v2004-20241007-en
General
-
Target
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
-
Size
43KB
-
MD5
a6927a5b7739703aff1ef6edb1b836ca
-
SHA1
772e70ab6f8d8aa50f98fac7a0078ac512c27ecf
-
SHA256
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f
-
SHA512
4a36be5e23ef09dce920d17921b6014a62b90f22842800a245ba03833694b388b42d1abc3c2229e6652e7fa2264c4361dbb094aa4a20e4e656e2e85b32a46e3a
-
SSDEEP
768:xkF37jMLFyeYHYUVZ4qM0Pb0P85Wes3mxGha5FEBqV4hgVLvx:xmos3Z4qMqb0P22POqgtZ
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run webcam_plugin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IExploreupdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsot_Centre\\centrdevoy.exe" webcam_plugin.exe -
resource yara_rule behavioral1/files/0x0009000000016cab-2.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2288 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1952 webcam_plugin.exe 1068 webcam_plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 1952 webcam_plugin.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language webcam_plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language webcam_plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1068 webcam_plugin.exe 1068 webcam_plugin.exe 1068 webcam_plugin.exe 1068 webcam_plugin.exe 1068 webcam_plugin.exe 1068 webcam_plugin.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1952 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 31 PID 1728 wrote to memory of 1952 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 31 PID 1728 wrote to memory of 1952 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 31 PID 1728 wrote to memory of 1952 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 31 PID 1952 wrote to memory of 1068 1952 webcam_plugin.exe 32 PID 1952 wrote to memory of 1068 1952 webcam_plugin.exe 32 PID 1952 wrote to memory of 1068 1952 webcam_plugin.exe 32 PID 1952 wrote to memory of 1068 1952 webcam_plugin.exe 32 PID 1728 wrote to memory of 2288 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 35 PID 1728 wrote to memory of 2288 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 35 PID 1728 wrote to memory of 2288 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 35 PID 1728 wrote to memory of 2288 1728 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe"C:\Users\Admin\AppData\Local\Temp\f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\webcam_plugin.exeC:\Users\Admin\AppData\Roaming\webcam_plugin.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\Microsot_Centre\webcam_plugin.exeC:\Users\Admin\AppData\Roaming\Microsot_Centre\webcam_plugin.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c UNISTA~1.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD59e771543981fbe1a58d429795e1a631f
SHA13b231887441b1f8b2c90896131c0550c557bdfaa
SHA256a8ed05538d0bdaafb3d12622d2e4b8efa9638c8e2ae1cbbe0d890eb71f8afed3
SHA51263fa10bf6e0b5dbcbceddee0631804b1b173c902be62cdcdf56c6b1b2f43cd62d9628342f7e91a60b977981918c6d42fdeee89defac9ab6c624d1eb679ce8c2d
-
Filesize
43KB
MD549646e603a809de63c005f859c1391f8
SHA1f4c9f65f60461d53e540f09c68d8b63ed996daa8
SHA256cb289f6e2bdadc1fe14b8883db949dc615d4730c34e2f2993d5935f16c61ba17
SHA512d9f67edcbb1360d654112d040ebe7c59be10abe8a69dbb8f52db8b126c3b3ac902db392fbf9d9f05779760d1f13c8534b0e94ee0e54c032bc860621d9f90dd49