Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe
Resource
win10v2004-20241007-en
General
-
Target
c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe
-
Size
32KB
-
MD5
6c830eeddbbaab623631936fb9d464d9
-
SHA1
ec6db37df806cb6ae4ef87ec78e850f3148bdaad
-
SHA256
c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3
-
SHA512
8b27e9cb750c1267e30544cd519f95401446c749a4e6524ca97026728829b7a9ca6e5073583e120d7ccd76726ec1c6e3eb6615371111c5a8e9e25279c5e05f4d
-
SSDEEP
384:SJ5PnwR2cJlNDpJShosZiP4YRfM9C0yUoKs/+EmiPbNX5kl3XO:Y5fwR9ZCosZiwYC9C0yZX7kl3XO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2784 herewin.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language herewin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2784 2668 c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe 30 PID 2668 wrote to memory of 2784 2668 c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe 30 PID 2668 wrote to memory of 2784 2668 c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe 30 PID 2668 wrote to memory of 2784 2668 c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe"C:\Users\Admin\AppData\Local\Temp\c21940769e3191e51a9f4c29ba17fd0ace90eca66b5cafc17e1fee2e385bb0c3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\herewin.exe"C:\Users\Admin\AppData\Local\Temp\herewin.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5e2d72b296cfde6859a167b517ab57cfc
SHA12d2fda8716fc9ee0e10698045e519e61ab3eaf19
SHA25608c9c058d08405bfc66ce943bd389db1c9a46d033dd15423639ca5343fcc97bc
SHA51257f9c28615054ed045758afcf6fe1ba021f2f425d19956d3bee0ccc7c1d42f89a996c32983255ce9f957a9cb8a97821d1d8b852016f96cd8b58150ccf72062e1