Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe
Resource
win10v2004-20241007-en
General
-
Target
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe
-
Size
8.6MB
-
MD5
aaaca3815bcc6ddf5ccd94d26f0a7232
-
SHA1
b1908791deb9d491ec15a02a21ec731af490f63e
-
SHA256
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437
-
SHA512
9e69d3021ddf725dbf5405b2a155e464e7aea9dba5bba54031cee3cf26b24e37a3a137668ef70b387f0736d3086d58adc7ddeb14b313a48913f0c1f18ad95f8a
-
SSDEEP
196608:+IgRNOW81jDGEePnJCdzNX/2WdCNinBiEJhhTXfhGMlxqikf2Lt:NgE5DbeRStLCNIVXf/uR6
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
Processes:
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exedescription ioc process File created C:\Windows\assembly\Desktop.ini afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe File opened for modification C:\Windows\assembly\Desktop.ini afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe -
Drops file in Windows directory 3 IoCs
Processes:
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exedescription ioc process File opened for modification C:\Windows\assembly afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe File created C:\Windows\assembly\Desktop.ini afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe File opened for modification C:\Windows\assembly\Desktop.ini afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.execsc.execvtres.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exedescription pid process Token: SeDebugPrivilege 4660 afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.execsc.exedescription pid process target process PID 4660 wrote to memory of 3512 4660 afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe csc.exe PID 4660 wrote to memory of 3512 4660 afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe csc.exe PID 4660 wrote to memory of 3512 4660 afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe csc.exe PID 3512 wrote to memory of 3184 3512 csc.exe cvtres.exe PID 3512 wrote to memory of 3184 3512 csc.exe cvtres.exe PID 3512 wrote to memory of 3184 3512 csc.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe"C:\Users\Admin\AppData\Local\Temp\afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lewuo3jx.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES829E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC829D.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD5510f9fbee05857f8dd43239ca9c3afb4
SHA1b1475e4bdc4379e8e19d628cc93ed694aba57379
SHA2563105b20b3c0b1a3cf8bdf5371310d36d36cd54a6c13d19f8bae419ffbcccbc00
SHA512b2bc9c0c9da65aff17672de55c97e3a70a9e0aac082856c8290750523ee6947d85cd008e8047fb363d97473a29006f8a8ec7a911c835790354694e3d06b29d4b
-
Filesize
1KB
MD54c4f1a549f4861da008fea66d7be6d5d
SHA1f3d9406cb5ef31513bf3013a39bcadf77792f93e
SHA256883d74c7d2e366fb9651de11591dd78af1e0c457339d6d04ddbe570078e69afc
SHA51277930cb475e70e27bc926d52c33d1dc1d9329f57a44e196115ec0a22d44bf90cb2bc830ffaf64499e506d7b894549d3f85b50593a9137505814c80ef5358541c
-
Filesize
12KB
MD5b8f68be446022dd802c2c7cd29568050
SHA1eb313c84d006e9320487ef1247bb4cb5cb3ae36a
SHA25637619eb9c895e131250c2fe2fabcdb95f91665bfd4d89343e89f75a67a81951f
SHA51226d12add584a11767dffbdfb2e366511a49022afb4cd9359f3fecbd7bdf0b9560a3edaad4f32d38ea7f64c79cbc48d19dd17d1f6b768c5382cfc0945161f9a52
-
Filesize
652B
MD5c161e9ca49e15018c40624bc9e88e864
SHA13f6ec71d685880afadc514c12e09d1d70197f475
SHA2560f8776a940b0027a520276caedfe1a0b37fef3203a3226f305bf35fa90d6e469
SHA51226e879cde8940175a4d1c3c7e918bacee30e197c8474744fe97e5c7d6e4c98feac5f1abc4469f117c9305a86eb855fbff42b0ffece4a63450deff55a11ec1863
-
Filesize
14KB
MD5b6f33a549d721b65a0b1162fea03667f
SHA13d0689bd3f5bd642ce1ec60de2c30afd0e55c72f
SHA2563d15ca0dcc27ce5a29e88b9824e84dc8be28017280917c7e28b8154796076be5
SHA512ef7c4deed575286ffe017efe6122bf22f10a38360d775d5e17f9767433d3f3b227efb11bb588da334c18ce91f2060fccb85d0386478d002df5b5c5d710aa0ca0
-
Filesize
290B
MD5b346e8af2e153d4b6416cf7ec3f0b918
SHA18be4ea74efbd8a08cfb8ed927cc1a71704c2c737
SHA25608ac26422f7071e54540404a1cbc54eea043376fddce2df04dc3f5b68b236372
SHA5129a7b483829815fb6c658fef14ea267d7dfa0504b668b8a623744da72ecdc95420d9714b1064ae2680ba051a0ef16739e270d746a1d3325d238f4791ef570ec49