Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 23:07
Behavioral task
behavioral1
Sample
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
Resource
win10v2004-20241007-en
General
-
Target
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
-
Size
481KB
-
MD5
a7ee819bfb900ad6d20ebe4d1da8af4c
-
SHA1
b50f78b7447b040f57d115c70c5fb4e62cac70f3
-
SHA256
b6331431d23acf4528527316a993890117bac208c604b054622efee21cbffcf5
-
SHA512
2683efbd00d03bc838e65b8bcc0640faabfbc63e9055b5b81aa42f338b25cf5998271df877fdf5f8fe4a13a0f3d93cdbf0ae71261753333702a79a824f5685e8
-
SSDEEP
12288:3uD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDST+DY:q09AfNIEYsunZvZ19ZAs
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
WScript.exepid process 3052 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeWScript.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exepid process 692 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exedescription pid process target process PID 692 wrote to memory of 3052 692 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe PID 692 wrote to memory of 3052 692 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe PID 692 wrote to memory of 3052 692 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe PID 692 wrote to memory of 3052 692 1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qznyntabwbfepukflpbryosnjzbzan.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD524446f68421e42c426b9776918c0a3f2
SHA14c6183055d3919503994a0b77ca2001856371f52
SHA256c1176c3074b59bc8094ae748faab17bd158f5e7f15f2e54e9716de9b07ed83fd
SHA512d6f484a0b4c4004772ede37c5f858352bc52c00fc56f476192e9b79b2b50e5d25c2721cc7606fbbbe21961a543145e9c6aac1887451af79acf9d2ff15b3b8b85
-
Filesize
828B
MD5fd4d288901413e8d992e3382e6a80e00
SHA1df54ad1fda8372c8b3a5273203b3ec9a8e0107a0
SHA2567610f747ba60dd471083b15d25eb6321c3983836bbe390e4c197124a6f243b90
SHA512e556e74fc662eebb496eeac1ebee4e3c7af089ae2743905ba66841f72f28a3f95327a23af47f7d3c1b334af41fb49f819589ccb0195aa8f409d8e67bf20b6163