Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe
Resource
win10v2004-20241007-en
General
-
Target
86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe
-
Size
15KB
-
MD5
ab56044b4cde9fc899318faf394917ba
-
SHA1
41c4a9f07243b16762727c837415d81927be3366
-
SHA256
86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926
-
SHA512
2fa759a8066b52a6cda79813428bee936b4214f40d593625860e244b4d0bb7ddca08af3483a8c81bb6f179c1f21bc478fba4fa14b72b73e53d58f38ffa4db8e4
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYvAD:hDXWipuE+K3/SSHgxm4D
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2896 DEMCCB1.exe 2796 DEM21F2.exe 2708 DEM7733.exe 2360 DEMCCF0.exe 1920 DEM228E.exe -
Loads dropped DLL 5 IoCs
pid Process 2528 86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe 2896 DEMCCB1.exe 2796 DEM21F2.exe 2708 DEM7733.exe 2360 DEMCCF0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMCCB1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM21F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM7733.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMCCF0.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2896 2528 86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe 32 PID 2528 wrote to memory of 2896 2528 86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe 32 PID 2528 wrote to memory of 2896 2528 86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe 32 PID 2528 wrote to memory of 2896 2528 86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe 32 PID 2896 wrote to memory of 2796 2896 DEMCCB1.exe 34 PID 2896 wrote to memory of 2796 2896 DEMCCB1.exe 34 PID 2896 wrote to memory of 2796 2896 DEMCCB1.exe 34 PID 2896 wrote to memory of 2796 2896 DEMCCB1.exe 34 PID 2796 wrote to memory of 2708 2796 DEM21F2.exe 36 PID 2796 wrote to memory of 2708 2796 DEM21F2.exe 36 PID 2796 wrote to memory of 2708 2796 DEM21F2.exe 36 PID 2796 wrote to memory of 2708 2796 DEM21F2.exe 36 PID 2708 wrote to memory of 2360 2708 DEM7733.exe 38 PID 2708 wrote to memory of 2360 2708 DEM7733.exe 38 PID 2708 wrote to memory of 2360 2708 DEM7733.exe 38 PID 2708 wrote to memory of 2360 2708 DEM7733.exe 38 PID 2360 wrote to memory of 1920 2360 DEMCCF0.exe 40 PID 2360 wrote to memory of 1920 2360 DEMCCF0.exe 40 PID 2360 wrote to memory of 1920 2360 DEMCCF0.exe 40 PID 2360 wrote to memory of 1920 2360 DEMCCF0.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe"C:\Users\Admin\AppData\Local\Temp\86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\DEMCCB1.exe"C:\Users\Admin\AppData\Local\Temp\DEMCCB1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\DEM21F2.exe"C:\Users\Admin\AppData\Local\Temp\DEM21F2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\DEM7733.exe"C:\Users\Admin\AppData\Local\Temp\DEM7733.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\DEMCCF0.exe"C:\Users\Admin\AppData\Local\Temp\DEMCCF0.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\DEM228E.exe"C:\Users\Admin\AppData\Local\Temp\DEM228E.exe"6⤵
- Executes dropped EXE
PID:1920
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5d21a5ae481058fcb35c3e7ca5b881152
SHA16930b5590b2aa48939613ec6b58d5d2cd944051d
SHA2561182081578ebf48309f2c77282f0a0eb8953008ebdff2dc7f9632b15c567fe6c
SHA512561be8a82af0a5ab77a2340fb08046461b7314672748e82f5fbec2e52842f0b2fbf93b3b2c58448f01a3ff2651c1a959e1bb2f751443290cb07f76e1d808a66d
-
Filesize
15KB
MD536a593e10e0db2a7150a17030b6b3f82
SHA1043fca05a35399d6733a46c0ea674313adccf9cb
SHA25643e00ed3dfd651084dc79cb8223e7ee5a906efafdb450132ecb880bf214b6329
SHA512388f767ba3ed1a12d680d5b61554651cfa2efc2507adb8b986a430b7927f164f59cb088ab1ac3ac17b740b88929a845bdef2b0f2a11b3d287af624ca7806a82a
-
Filesize
15KB
MD525d6ff0de38297471e94d50e8a9e586b
SHA168aefa688270b5fd67f3d505b1ce3ab47544493f
SHA256ed1938ad9a7c29aae39e682b121ad6c40b3d2c2360c1c645691cf1d71d91101c
SHA512ae6dfb1b42d297e8cc7f1e93076fdf497ab168badc9901b5bbfc977af8ac5cf7f5a8c7feaf59b1c7f6c5c7d13cabc1d927cc5aa47088f22fc2b3534f8d4cb876
-
Filesize
15KB
MD558a2c25f502e1d400e05d2b21fc80163
SHA1f87913ab9ebd5c9149e6b265d73dd29149e7f253
SHA256265151e2df8107206f8e1ba99e044076b349c2932478cb9d355fe951ac0cc603
SHA51209332619025c31deac161325842ae6136601c6ed48e43d966c856440f4764ec9305309f161696a177b446b481989d4b2c55706b7d4f6ffeffa959d8bfdab0e9a
-
Filesize
15KB
MD56086fd30690ecd424da160f7edfcf739
SHA13d6dbff3250ac69fa275008731e950d7f9100e27
SHA256d657c0a44f4ead24de0ef4cdba4a859b2ff11735182fe4e4d8c4f344612a7ecf
SHA51271d5ba7bb120134ccb472c6a78391d744c1d6e878b9685591bdc75c66c9b08bacbef508ec56219533882f5ced085ed3a21d929aea6b49f58faf961045c4ba491