Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 17:57
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
TEst2.exe
Resource
win7-20241023-en
windows7-x64
7 signatures
150 seconds
General
-
Target
TEst2.exe
-
Size
5.2MB
-
MD5
0944900665d80daea35877425ea31206
-
SHA1
d5b4ebe23d8d0457de2c82ef1a637b253349fb50
-
SHA256
4597d3959f9503aae779f95e81bf32b3d7b9d5faca9ee0f741c6bb3b7fa40b74
-
SHA512
c5dd8c5b3adca98eedf0fc048722c3bc9a60850321fd1eb95ad0c26daaa664ee20fcb0dec7ae73d4abfd1ad85e63baf2068acd6d027b2cac67eb9507edfa275d
-
SSDEEP
98304:CSYl+O1E/Uo8EoT9AfvDm+CIUzwNhiDbY1UaV/:CS7Uo/bfyhIUziUbIU+
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
WeMod.exeSirus.exepid process 2332 WeMod.exe 2804 Sirus.exe -
Loads dropped DLL 4 IoCs
Processes:
TEst2.exepid process 2988 TEst2.exe 2988 TEst2.exe 2988 TEst2.exe 2988 TEst2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
WeMod.exepid process 2332 WeMod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
TEst2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TEst2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
WeMod.exepid process 2332 WeMod.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
TEst2.exedescription pid process target process PID 2988 wrote to memory of 2332 2988 TEst2.exe WeMod.exe PID 2988 wrote to memory of 2332 2988 TEst2.exe WeMod.exe PID 2988 wrote to memory of 2332 2988 TEst2.exe WeMod.exe PID 2988 wrote to memory of 2332 2988 TEst2.exe WeMod.exe PID 2988 wrote to memory of 2804 2988 TEst2.exe Sirus.exe PID 2988 wrote to memory of 2804 2988 TEst2.exe Sirus.exe PID 2988 wrote to memory of 2804 2988 TEst2.exe Sirus.exe PID 2988 wrote to memory of 2804 2988 TEst2.exe Sirus.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TEst2.exe"C:\Users\Admin\AppData\Local\Temp\TEst2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\WeMod.exeC:\Users\Admin\AppData\Roaming\WeMod.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Users\Admin\AppData\Roaming\Sirus.exeC:\Users\Admin\AppData\Roaming\Sirus.exe2⤵
- Executes dropped EXE
PID:2804
-