Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe
Resource
win10v2004-20241007-en
General
-
Target
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe
-
Size
224KB
-
MD5
ab62135e37a25f5913e938799e9dad9d
-
SHA1
cee5ca01392ddb7de29c2688c624fcaaed34e1a3
-
SHA256
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3
-
SHA512
881ac1546d101932997f80822c59dee9924d17ca148fede7373f2b89a96da9ecb09060a19eeebfe07ed5ad9af239ab58ee278122f0a3e35d5b3cc4192f1b1ea3
-
SSDEEP
3072:prf68sOI3V8arcCXM8fmvbpjLOIig7L+cD4CZs8s3Pan4:BlwVxbMtLu8VZcCn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 WMIC.exe -
Loads dropped DLL 1 IoCs
pid Process 2120 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2120 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 2216 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2216 2120 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 30 PID 2120 wrote to memory of 2216 2120 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 30 PID 2120 wrote to memory of 2216 2120 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 30 PID 2120 wrote to memory of 2216 2120 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe"C:\Users\Admin\AppData\Local\Temp\11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Intel\WMIC.exeC:\Intel\WMIC.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5ba5c02509445bb656f5c71b392c2525e
SHA1e75e978cc722cc0181f5440aaad0915ab205eece
SHA25654acd5643638b2daab2f95fb515b5ee72e0c60fe906a2fc61bc54fc8baad0e4d
SHA5125d7deacea3bb1cea2307f7ad48265f19a14d431614de3afe0753ea1b845b75460525260cf396fd4262fc3ed62dd562baf450063e157b3a3cf9e2496dfecd2362
-
Filesize
224KB
MD59bb038e7e596e79f78da2828663be3c8
SHA113cfb6a87b2144a436c8620e30d64149c6670c72
SHA256e973a9deac8562fa3f9ea26c1794cab6792220f47935b787d513e0375ed6fa0e
SHA512e0bb252d4c0fbc4ca4e21204f111e9eebdfe7f9a0dd2b31c4f3f448582a5a401c71aaed0146dc4b6252f5c2ca356d80e4be56249503ab79449c4c924f6cbdda7