Analysis
-
max time kernel
144s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
ABTech.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ABTech.exe
Resource
win10v2004-20241007-en
General
-
Target
ABTech.exe
-
Size
141.7MB
-
MD5
1434c3fbbc8aadd0bdbeb17188ecbb30
-
SHA1
87dd89f9645e0aad3a83a5e6a88fb32609811175
-
SHA256
8968bebdc8a4a219676d0f03e4b9aa967f66dffedea0f165e4d99efce81443f7
-
SHA512
18e0edff038df5b463081da229f7f426747759761d9aae75f1542cad1eadd12ab387bd0b978314259954919172bfb0881b59060ba15b765a936a9a0af4af7889
-
SSDEEP
3145728:i9J2fFh9HdLSysODYjBxpxYES+LqOI4MTzU4UcpaPbHn:PFh9HpOWUBxp7SiqtTzEcpQH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ABTech.tmppid process 2552 ABTech.tmp -
Loads dropped DLL 3 IoCs
Processes:
ABTech.exeABTech.tmppid process 2380 ABTech.exe 2552 ABTech.tmp 2552 ABTech.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ABTech.exeABTech.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ABTech.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ABTech.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ABTech.tmppid process 2552 ABTech.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ABTech.exedescription pid process target process PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp PID 2380 wrote to memory of 2552 2380 ABTech.exe ABTech.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\ABTech.exe"C:\Users\Admin\AppData\Local\Temp\ABTech.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\is-NUMOA.tmp\ABTech.tmp"C:\Users\Admin\AppData\Local\Temp\is-NUMOA.tmp\ABTech.tmp" /SL5="$501AE,147912410,433664,C:\Users\Admin\AppData\Local\Temp\ABTech.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.7MB
MD5079e12a0aaf2d84c349155469db4d425
SHA12759e612710cbf618680100c5ef03a6cdfa81f64
SHA2564c635334e4d8539f4aa90fb3e5f3786f8e5ee5864dde5db094f3810d4f6df7eb
SHA512b837f47696b5e4a059b7c9c2d289bf66b150bf73938062c2fe9fe25ea5e145ed61a9382b8aa74d3b579f0a1b99973d975a7efced61709ce6178bdcbd76632dfd