Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
Fully Working Diddy.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Fully Working Diddy.exe
Resource
win10v2004-20241007-en
General
-
Target
Fully Working Diddy.exe
-
Size
80KB
-
MD5
3f70020fbdd67124534a0747b5519cc2
-
SHA1
72749d11729adf7958b03d5c8d9f0505778cbf53
-
SHA256
f500e4b13e74f97afd55b32e6f4a64183145c16f4ef02fc527a9d49e49a234b1
-
SHA512
50fdac52a9ea465f10aaff3f028d46966e08863b29d86efade5dbf9c4d38b7008641afa15398ea1b45c1d80933fc7d4285b82cd172b7b0c66c149f9c4a19fc9c
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/oOR4:o23rbZi/8GprF3jg/oY4
Malware Config
Signatures
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2496 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fully Working Diddy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2328 2368 Fully Working Diddy.exe 32 PID 2368 wrote to memory of 2328 2368 Fully Working Diddy.exe 32 PID 2368 wrote to memory of 2328 2368 Fully Working Diddy.exe 32 PID 2368 wrote to memory of 2328 2368 Fully Working Diddy.exe 32 PID 2328 wrote to memory of 2092 2328 cmd.exe 33 PID 2328 wrote to memory of 2092 2328 cmd.exe 33 PID 2328 wrote to memory of 2092 2328 cmd.exe 33 PID 2328 wrote to memory of 2092 2328 cmd.exe 33 PID 2368 wrote to memory of 2288 2368 Fully Working Diddy.exe 34 PID 2368 wrote to memory of 2288 2368 Fully Working Diddy.exe 34 PID 2368 wrote to memory of 2288 2368 Fully Working Diddy.exe 34 PID 2368 wrote to memory of 2288 2368 Fully Working Diddy.exe 34 PID 2368 wrote to memory of 2612 2368 Fully Working Diddy.exe 35 PID 2368 wrote to memory of 2612 2368 Fully Working Diddy.exe 35 PID 2368 wrote to memory of 2612 2368 Fully Working Diddy.exe 35 PID 2368 wrote to memory of 2612 2368 Fully Working Diddy.exe 35 PID 2368 wrote to memory of 2292 2368 Fully Working Diddy.exe 36 PID 2368 wrote to memory of 2292 2368 Fully Working Diddy.exe 36 PID 2368 wrote to memory of 2292 2368 Fully Working Diddy.exe 36 PID 2368 wrote to memory of 2292 2368 Fully Working Diddy.exe 36 PID 2368 wrote to memory of 2496 2368 Fully Working Diddy.exe 37 PID 2368 wrote to memory of 2496 2368 Fully Working Diddy.exe 37 PID 2368 wrote to memory of 2496 2368 Fully Working Diddy.exe 37 PID 2368 wrote to memory of 2496 2368 Fully Working Diddy.exe 37 PID 2496 wrote to memory of 2540 2496 cmd.exe 38 PID 2496 wrote to memory of 2540 2496 cmd.exe 38 PID 2496 wrote to memory of 2540 2496 cmd.exe 38 PID 2496 wrote to memory of 2540 2496 cmd.exe 38 PID 2368 wrote to memory of 1992 2368 Fully Working Diddy.exe 39 PID 2368 wrote to memory of 1992 2368 Fully Working Diddy.exe 39 PID 2368 wrote to memory of 1992 2368 Fully Working Diddy.exe 39 PID 2368 wrote to memory of 1992 2368 Fully Working Diddy.exe 39 PID 2368 wrote to memory of 2508 2368 Fully Working Diddy.exe 40 PID 2368 wrote to memory of 2508 2368 Fully Working Diddy.exe 40 PID 2368 wrote to memory of 2508 2368 Fully Working Diddy.exe 40 PID 2368 wrote to memory of 2508 2368 Fully Working Diddy.exe 40 PID 2368 wrote to memory of 2052 2368 Fully Working Diddy.exe 41 PID 2368 wrote to memory of 2052 2368 Fully Working Diddy.exe 41 PID 2368 wrote to memory of 2052 2368 Fully Working Diddy.exe 41 PID 2368 wrote to memory of 2052 2368 Fully Working Diddy.exe 41 PID 2368 wrote to memory of 2444 2368 Fully Working Diddy.exe 42 PID 2368 wrote to memory of 2444 2368 Fully Working Diddy.exe 42 PID 2368 wrote to memory of 2444 2368 Fully Working Diddy.exe 42 PID 2368 wrote to memory of 2444 2368 Fully Working Diddy.exe 42 PID 2368 wrote to memory of 2828 2368 Fully Working Diddy.exe 43 PID 2368 wrote to memory of 2828 2368 Fully Working Diddy.exe 43 PID 2368 wrote to memory of 2828 2368 Fully Working Diddy.exe 43 PID 2368 wrote to memory of 2828 2368 Fully Working Diddy.exe 43 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2540 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fully Working Diddy.exe"C:\Users\Admin\AppData\Local\Temp\Fully Working Diddy.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Window Title2⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74