Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe
Resource
win10v2004-20241007-en
General
-
Target
4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe
-
Size
15KB
-
MD5
19f18ab10754932bba68ab53cd71d16b
-
SHA1
36661fa85cbcb93a3bc8fdd9441a2f52995d1d99
-
SHA256
4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026
-
SHA512
c88fbb06014414037e4793a41e2a94782c5c44768ff00f0a334b66bcce6753961550539a43dad8d18ced04b24a9f8ca24fff57d15b55941b02ae3099c3271a63
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhvFBjM:hDXWipuE+K3/SSHgxlFBg
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2300 DEMD356.exe 2144 DEM2961.exe 2640 DEM7EE0.exe 1604 DEMD4FB.exe 1924 DEM2A5B.exe -
Loads dropped DLL 5 IoCs
pid Process 2308 4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe 2300 DEMD356.exe 2144 DEM2961.exe 2640 DEM7EE0.exe 1604 DEMD4FB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM2961.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM7EE0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD4FB.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2300 2308 4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe 32 PID 2308 wrote to memory of 2300 2308 4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe 32 PID 2308 wrote to memory of 2300 2308 4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe 32 PID 2308 wrote to memory of 2300 2308 4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe 32 PID 2300 wrote to memory of 2144 2300 DEMD356.exe 34 PID 2300 wrote to memory of 2144 2300 DEMD356.exe 34 PID 2300 wrote to memory of 2144 2300 DEMD356.exe 34 PID 2300 wrote to memory of 2144 2300 DEMD356.exe 34 PID 2144 wrote to memory of 2640 2144 DEM2961.exe 36 PID 2144 wrote to memory of 2640 2144 DEM2961.exe 36 PID 2144 wrote to memory of 2640 2144 DEM2961.exe 36 PID 2144 wrote to memory of 2640 2144 DEM2961.exe 36 PID 2640 wrote to memory of 1604 2640 DEM7EE0.exe 39 PID 2640 wrote to memory of 1604 2640 DEM7EE0.exe 39 PID 2640 wrote to memory of 1604 2640 DEM7EE0.exe 39 PID 2640 wrote to memory of 1604 2640 DEM7EE0.exe 39 PID 1604 wrote to memory of 1924 1604 DEMD4FB.exe 41 PID 1604 wrote to memory of 1924 1604 DEMD4FB.exe 41 PID 1604 wrote to memory of 1924 1604 DEMD4FB.exe 41 PID 1604 wrote to memory of 1924 1604 DEMD4FB.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe"C:\Users\Admin\AppData\Local\Temp\4ce2aa845942322218471de9d3b776dd12d04a15d5b959fffeb9d83dab524026.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\DEMD356.exe"C:\Users\Admin\AppData\Local\Temp\DEMD356.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\DEM2961.exe"C:\Users\Admin\AppData\Local\Temp\DEM2961.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\DEM7EE0.exe"C:\Users\Admin\AppData\Local\Temp\DEM7EE0.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\DEMD4FB.exe"C:\Users\Admin\AppData\Local\Temp\DEMD4FB.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\DEM2A5B.exe"C:\Users\Admin\AppData\Local\Temp\DEM2A5B.exe"6⤵
- Executes dropped EXE
PID:1924
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5cc8abc55d6f360e18b2413b7f6ae49c5
SHA1aa1a784829b5cde23ae72b54d85b669efb27e2d6
SHA256e7380b76bc2ec83cef2926f4187c00aa5e11ac030b8226f41eb4f03474e0b978
SHA512b0769a5112818ed5927041eaab1a23c796a333c9954f7e6e58f237438bbdab7b984ec4067f26c2175ba2ce7dae0f1c54d892953be2669beaf62b552e1ef19b44
-
Filesize
15KB
MD50cdaf7064fc733d50c0463988c28fce8
SHA1ea3af23ace5c9b3033cff12d5d011907493dbcb8
SHA25670f7ac6d98ada07eb8c257502623c589a0d24b463aca18b6404e1c1cebb61e87
SHA5126e7dd6e486d8ea4a847a9fe15cd9b35cbafb2eb674a1c03c3fca1ce6e4acd13e0d2c446694829135909b5c6ae77af932c16d05b4f27d5976b6adc1aba70ef408
-
Filesize
15KB
MD5575c6b182510f2cfe563e1d91b6c702b
SHA19359c6132e73e57c5b28e38bc5b19d758035f4b5
SHA256bb30b36fe0ac593c5d8fc80f59292d1429b84f8a2ed0dfe8d319ee5d0d2446d7
SHA5128cb19db75aefec02b76ffabc50a799f67430abbea0335c9397b66b8a9540d7fae0cc84272d073e1ad5b205722317795ec36f527bd42cd957fe2c9d6ddf70fe3b
-
Filesize
15KB
MD5e68ce27ff394b70f8b1a80d66d7fd82f
SHA1fee3f23695f4a00effae1dcbfe3412f32b76cb04
SHA256efc1b4a2be7c60b3b695aa9ed01cde8e35b77743cfdd99693fe4f8984fc01ee9
SHA51232b8bec0f396b1933858aaee75886b12b145d5ed8886ae8538dc11e41ee33b8e85fd7e388c76a1a776ef2b5cb08f165f02cc5469ef4d4eae2adc516fa12daa82
-
Filesize
15KB
MD5f1e38b8bc7e98d567bc4eb17ab5d4b62
SHA1d9dba08bbe2c530a4377dd90a054816e619364c0
SHA25674751336a56700f4d54d758acb842ff50be06b6e305500922b359a337363efc9
SHA5125d7f53e6b9f353d7021c61add05198749a3d826094b84a11c7bc65ff5e3ec5242952c4a9923d2fbdf0b5555d5bc690f80bdbecbfd629a957e976627e5ed227bd