Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe
Resource
win10v2004-20241007-en
General
-
Target
ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe
-
Size
93KB
-
MD5
e4a98e87a9335207fd785a7ac84d8c90
-
SHA1
ae86720e0e0e70a277cf15714f90c5b41f0bb4d9
-
SHA256
ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050
-
SHA512
6c06cc4a6580bdd44599a9fe68d94e53fd648fa2aba736f88ea73b3308e94abc084cac58dbb516a1f1b2219c4e3f5bb2bcadf7fac42208821353057b7cd207b7
-
SSDEEP
1536:OUMTIGU8vM3dG7l5rphVgEQF5NM4Jt78eRL2h+nhMJ41me:ObTIGbvM3dIhVYFU4JtVRqYnCJ41me
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation COM7.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDF FoxitReader.exe COM7.EXE -
Executes dropped EXE 4 IoCs
pid Process 3456 achsv.exe 1464 COM7.EXE 3868 achsv.exe 2828 COM7.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COMLOADER = "\\\\.\\F:\\Program Files\\FoxitReader\\bin\\COM7.EXE" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language achsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM7.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language achsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM7.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3688 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3456 achsv.exe 3456 achsv.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3868 achsv.exe 3868 achsv.exe 2828 COM7.EXE 2828 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 1464 COM7.EXE 1464 COM7.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3456 achsv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3456 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 86 PID 3220 wrote to memory of 3456 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 86 PID 3220 wrote to memory of 3456 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 86 PID 3220 wrote to memory of 1464 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 92 PID 3220 wrote to memory of 1464 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 92 PID 3220 wrote to memory of 1464 3220 ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe 92 PID 1464 wrote to memory of 3688 1464 COM7.EXE 99 PID 1464 wrote to memory of 3688 1464 COM7.EXE 99 PID 1464 wrote to memory of 3688 1464 COM7.EXE 99 PID 1464 wrote to memory of 3868 1464 COM7.EXE 101 PID 1464 wrote to memory of 3868 1464 COM7.EXE 101 PID 1464 wrote to memory of 3868 1464 COM7.EXE 101 PID 3456 wrote to memory of 2828 3456 achsv.exe 103 PID 3456 wrote to memory of 2828 3456 achsv.exe 103 PID 3456 wrote to memory of 2828 3456 achsv.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe"C:\Users\Admin\AppData\Local\Temp\ed79100c1e1051ddce0e08da195154ff4ef2cbb73ae650251596c5d135f89050N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COMLOADER /d "\\.\F:\Program Files\FoxitReader\bin\COM7.EXE"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD528c0f9af32cdc3e8a0f1e62ccb8e5456
SHA157cb04eded4253deb6d700b271f6cab6abeff485
SHA25618c34861276756bd6a47064515bf5b75134f9e27b51b96827583820eb72e961d
SHA5120ece5f28f3925bc00c3ebd46fa334d8af8aee30b695e14aab4575ce67b533ebc9b1332a8e9fc59f012fc48fb570b5607ceb85ba72fe394a738d41362d7359f33
-
Filesize
93KB
MD5f841e1e0491bc2a28d236d2e354c5ec8
SHA1dcf6de402c0847f6c4de1b0107efa4590e55a3e8
SHA25625692a06e1db703ac4102a7084e0cd25cb1cd24cf1725b439935a31cd625a0ed
SHA512d64d96b099cb9f650968978adba0949a5e0764545eecb1fadb7cc094c5af48671d861a00ed48ddae241cc9fe1f2d54598b99e5cc92277a1c7f9e9d3ce2867020