Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe
Resource
win10v2004-20241007-en
General
-
Target
1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe
-
Size
16KB
-
MD5
7dbdf5f1a616ed9a759ab57b792088a4
-
SHA1
b15e54447a756f2c5ef3f938a193c9e278f1fe58
-
SHA256
1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f
-
SHA512
1b2300a569ea8fc6513aaca28847e3f76b282d9f7516247603b36a9bafb5bad05fe04617131036e8a337609279d0a41d0fdf34db94258b6a9f51e34cc9e09ec4
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhR0pkzT3T:hDXWipuE+K3/SSHgx4Gz/
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2696 DEM9731.exe 2216 DEMECA0.exe 2144 DEM420F.exe 2660 DEM976F.exe 2228 DEMECB0.exe -
Loads dropped DLL 5 IoCs
pid Process 1848 1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe 2696 DEM9731.exe 2216 DEMECA0.exe 2144 DEM420F.exe 2660 DEM976F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM9731.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMECA0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM420F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM976F.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2696 1848 1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe 32 PID 1848 wrote to memory of 2696 1848 1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe 32 PID 1848 wrote to memory of 2696 1848 1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe 32 PID 1848 wrote to memory of 2696 1848 1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe 32 PID 2696 wrote to memory of 2216 2696 DEM9731.exe 34 PID 2696 wrote to memory of 2216 2696 DEM9731.exe 34 PID 2696 wrote to memory of 2216 2696 DEM9731.exe 34 PID 2696 wrote to memory of 2216 2696 DEM9731.exe 34 PID 2216 wrote to memory of 2144 2216 DEMECA0.exe 36 PID 2216 wrote to memory of 2144 2216 DEMECA0.exe 36 PID 2216 wrote to memory of 2144 2216 DEMECA0.exe 36 PID 2216 wrote to memory of 2144 2216 DEMECA0.exe 36 PID 2144 wrote to memory of 2660 2144 DEM420F.exe 38 PID 2144 wrote to memory of 2660 2144 DEM420F.exe 38 PID 2144 wrote to memory of 2660 2144 DEM420F.exe 38 PID 2144 wrote to memory of 2660 2144 DEM420F.exe 38 PID 2660 wrote to memory of 2228 2660 DEM976F.exe 40 PID 2660 wrote to memory of 2228 2660 DEM976F.exe 40 PID 2660 wrote to memory of 2228 2660 DEM976F.exe 40 PID 2660 wrote to memory of 2228 2660 DEM976F.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe"C:\Users\Admin\AppData\Local\Temp\1088d8e7fbab709277ec3e94886d86126e2d20675211d15ca417bc124e06bb2f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\DEM9731.exe"C:\Users\Admin\AppData\Local\Temp\DEM9731.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\DEMECA0.exe"C:\Users\Admin\AppData\Local\Temp\DEMECA0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\DEM420F.exe"C:\Users\Admin\AppData\Local\Temp\DEM420F.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\DEM976F.exe"C:\Users\Admin\AppData\Local\Temp\DEM976F.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\DEMECB0.exe"C:\Users\Admin\AppData\Local\Temp\DEMECB0.exe"6⤵
- Executes dropped EXE
PID:2228
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5ef3f9030b16bb6134f459e356b2074e2
SHA14f5c20f5b28603755797e24493a240b3b003ddf5
SHA256c20940638540632ff6a1d5abf9aa0dd0dcf0e0030b22bbd26a832a2ed5c1eb51
SHA512bd34a1db3180679340664258659a0b5b071c92ad5e96baa42fb8960f3b5240402cadfcf2336650d604dfedca85d44e3fd0244b588aa37190fe70cbd7fee2798a
-
Filesize
16KB
MD5574ddb671807fda0bc8407bebba6ea88
SHA107eed3dbfde6217a5cab0f23788b6d15fc4e5441
SHA256522a7dd11ee63e386a6e4b0750157f3978270292601e90d1b6b285043d7a88c6
SHA51245ea642516b033237859893c578650c5fa362d21b2fb580477fedb81b9b533bb061d55040697c5db17cca38e5437252f1489dbe40d7dcf3cb752e6de33bb37e9
-
Filesize
16KB
MD55dbaf22239f8994600ea3ce1267f23d2
SHA1444e9e3d15270dcb1bab65f6f717289114231eac
SHA25657e832f9a1510b2e3575f0f73abc62a9b6dda2048ff6b28cb6ae6c3647ce9aae
SHA512b90ef7ec586bf335ede9324c4c441a85b025506b596406cb6d691437dae04880307ee8d393922adf836e4d1bb5d1a587c20c2792923f6d635b870e302b3a93a7
-
Filesize
16KB
MD5f13c347a90d5ad6493e06757f0b2b356
SHA11fe7028c035b047fb4655e4f0b4094662bea9e6d
SHA256370f0d6f9cb0abb4e36bbbca5f1a09e7e2c59212a946b1f49407681326d35a95
SHA51255291a550a88708472f4a31daf2ce8ceceabe34c5f30423937570713515829e0bf9e232198e1de021e375f159ac416e5961664fd8e24da468a202ee20cedac6d
-
Filesize
16KB
MD5d4b8e64f2a86322af4707460ce0699fd
SHA19518371e0893be65dfb8fafad0128e122c391e2e
SHA2567cf31f7e47a90b2e5e89212b04b33e30ffe790db7cb0aa30f98b2ed1a283798a
SHA512cb094cdc4efcff45b92f1bd692d37256e6123c4b78b57a2a50f619393c8e6cb95b53c1117413ada2a1ad1b4ad11d9efffe70733c6487049914d424aa7a215e19