Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:09
Behavioral task
behavioral1
Sample
2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe
Resource
win7-20241010-en
General
-
Target
2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe
-
Size
39KB
-
MD5
25cb5edb2bf6b21529f2d430c34714a6
-
SHA1
c8a37bf9c59dcea7d09156906a488a2cd4fa637d
-
SHA256
2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4
-
SHA512
940f67f6ed675b400ba8425d4cc7bbc9340f6a6b07f063d8b65a163035af22977ffd4d156a0ab907124e23704859d9b85305297c31549e1ecfc03341de731443
-
SSDEEP
768:Nzj1JegVa3Gry+uELEmITCs/NUZ6nZdYbCLECkrQoP9fmF2f1cOGue:NWQa2TLEmITcoQxfllfmS1cO6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2724 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x0008000000016ce9-4.dat upx behavioral1/memory/2724-13-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2408-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2724-21-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2312 sc.exe 2148 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 2724 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2312 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 30 PID 2408 wrote to memory of 2312 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 30 PID 2408 wrote to memory of 2312 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 30 PID 2408 wrote to memory of 2312 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 30 PID 2408 wrote to memory of 2724 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 32 PID 2408 wrote to memory of 2724 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 32 PID 2408 wrote to memory of 2724 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 32 PID 2408 wrote to memory of 2724 2408 2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe 32 PID 2724 wrote to memory of 2148 2724 smss.exe 33 PID 2724 wrote to memory of 2148 2724 smss.exe 33 PID 2724 wrote to memory of 2148 2724 smss.exe 33 PID 2724 wrote to memory of 2148 2724 smss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe"C:\Users\Admin\AppData\Local\Temp\2d8e92ce3c7766133446503526eb981b35e8d364057375badb421cffc537dee4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5f1a57adcb1c9de6f76272908930f0cdf
SHA14ea1df84aefa1f5ab697148b99ccb67e125537a5
SHA256b30222d0ae0e262f316230a7cd200c00aeb06cc13c49286cc2a2e4cf2904539f
SHA512179680e592acf6136cce919d86780ff709cdedd24d502e781538d444f01c21dfcc05fd5c87f1c7f79e8d71e7ad99dfab72a4cd79868e5993fda96f3de6665ac1