Overview
overview
7Static
static
388065e1cf3...ab.exe
windows7-x64
788065e1cf3...ab.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/WLAN...64.exe
windows7-x64
1$TEMP/WLAN...64.exe
windows10-2004-x64
1$TEMP/WLAN...86.exe
windows7-x64
3$TEMP/WLAN...86.exe
windows10-2004-x64
3$TEMP/check_wired.cmd
windows7-x64
4$TEMP/check_wired.cmd
windows10-2004-x64
4$TEMP/wlan_test.exe
windows7-x64
1$TEMP/wlan_test.exe
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsArray.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$TEMP/WLANSetEAPUserDatax64.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
$TEMP/WLANSetEAPUserDatax64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$TEMP/WLANSetEAPUserDatax86.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$TEMP/WLANSetEAPUserDatax86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$TEMP/check_wired.cmd
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/check_wired.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$TEMP/wlan_test.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$TEMP/wlan_test.exe
Resource
win10v2004-20241007-en
General
-
Target
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe
-
Size
224KB
-
MD5
c6509b96aa39f74e0bbdddd353e1f73f
-
SHA1
0c1d3279c7e25e7d70f90335acb19d7ab5d27ffd
-
SHA256
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab
-
SHA512
26674b97815bdccb6ce700c81be249b3a0ba213208f7ed0d6efde674113d5817b81299c713fe01530724afefec7717a93980fd57eefd26891187523417b02153
-
SSDEEP
3072:6aC/ozTJ9vwdSJT+IkAf+5UjJRbrw6wWDdFqFPnUK/TvsEv//ntF+zWqCV76Mzha:FC/KTXod3uQcRb3VkvFnnj+zi6Mdyik
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
wlan_test.exepid process 4320 wlan_test.exe -
Loads dropped DLL 4 IoCs
Processes:
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exepid process 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exewlan_test.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlan_test.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exedescription pid process target process PID 2696 wrote to memory of 4320 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe wlan_test.exe PID 2696 wrote to memory of 4320 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe wlan_test.exe PID 2696 wrote to memory of 4320 2696 88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe wlan_test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe"C:\Users\Admin\AppData\Local\Temp\88065e1cf38a7c3a48c8a3d0de61bb2bd1167c65187074a3cd3ea269fe4c4dab.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\wlan_test.exeC:\Users\Admin\AppData\Local\Temp\wlan_test.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e5240dcd169abe69a7332d01106e1d84
SHA12ca68892501102586f6ab4eb99744d7f6138c166
SHA25696c40847d52270061c25743bc9ec4843be1991f3ac36c2d1b78ec04a04437ea4
SHA512519479d1c6bfd4fcb11e0802f9cf5eb7b324577514a986f0fdf07d33ff6a275dc5ac41654aed818d1c30e0bdda543297f4b7886442cbc93066a808cafbaf8a70
-
Filesize
29KB
MD526c8a92678f1b970ac2a700bb844c309
SHA1c821a5980c31b0b35f1505cde836d6769f45e3a3
SHA2562a7b5d1cab96a5280b0694d0ed54510129626a1ba36a51bd34d546972b7d18b8
SHA512fba6e371853fd6c27097eb7cce7ffc59d71e4f0a9b5e55de06472d094b70c44a409bd82f39d9a27a814e826ab8468c59e947401a3c3ead1f057cbac236588860
-
Filesize
12KB
MD5da4bc09439ed21faf7620a53433aac92
SHA194e3347aebe16cb88b9f29f00134d9e0fb67e508
SHA256216d68d3f0b37bb2203b3a438a84a089e8c388608f46377ad7e7d6a2709cf9b0
SHA512920294456e8fee0c4137e4b4ba1389f09ade297d6ed49d78a9593d129dbb5eb048da2cbff7ac29687999991d5f38657cb31af73e2ccf6b8b9ce29480d4d81ec6
-
Filesize
11KB
MD57c0dc12cdc807a3bb4afda989a663f95
SHA13db74d921bd68ce73834de4636bbec03b21723ff
SHA2560d022cc0aa60a3f41dbeb6776e9acb016ff3d42396e3371f15cc22352e621eb5
SHA51222301b351c0332fce7b0d6b21e2b1dc9a850658b8ac610bfa4fb9d02adfbdad30211f04edcabd4141574d243cb6333ef78adb6647860641c84e5d6dc6f635a20
-
Filesize
8KB
MD540bca6124fa7eef106c0d76c428d9471
SHA1dadd29d90007602be8ecd18406dc28634d0bbb2d
SHA256fc03209d76e6c41c11dde8621f1eb03ff348a12566cb9b63e7aa2d6cef8086aa
SHA5125167d2bbe094dc7a3ecf89e508ae869dcff08c4159b7756cb03c2f5431e084ff34d1834e5294892f81f00e96664a67081d8212dde310f553a7f6237a1144a5be