Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
Resource
win10v2004-20241007-en
General
-
Target
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
-
Size
20KB
-
MD5
fd01b96befef060da133465b23dab5ee
-
SHA1
247f17ab86ec296e0d0b7a1d17060960fe82e8d4
-
SHA256
58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85
-
SHA512
5f6ff87ac7d0b8acd5e131cac5f65268cbff0eb4ec9ad4bce59d0379ea942474eb2d7a6ac6c67f36f79eebf7a71684a3041000aa3063d29d681239729440d818
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+L4113:hDXWipuE+K3/SSHgxmHZ19
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2864 DEM712A.exe 2708 DEMC83F.exe 1500 DEM1EE6.exe 2996 DEM756E.exe 2948 DEMCC54.exe -
Loads dropped DLL 5 IoCs
pid Process 564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 2864 DEM712A.exe 2708 DEMC83F.exe 1500 DEM1EE6.exe 2996 DEM756E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM712A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMC83F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM1EE6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM756E.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 564 wrote to memory of 2864 564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 31 PID 564 wrote to memory of 2864 564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 31 PID 564 wrote to memory of 2864 564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 31 PID 564 wrote to memory of 2864 564 58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe 31 PID 2864 wrote to memory of 2708 2864 DEM712A.exe 33 PID 2864 wrote to memory of 2708 2864 DEM712A.exe 33 PID 2864 wrote to memory of 2708 2864 DEM712A.exe 33 PID 2864 wrote to memory of 2708 2864 DEM712A.exe 33 PID 2708 wrote to memory of 1500 2708 DEMC83F.exe 35 PID 2708 wrote to memory of 1500 2708 DEMC83F.exe 35 PID 2708 wrote to memory of 1500 2708 DEMC83F.exe 35 PID 2708 wrote to memory of 1500 2708 DEMC83F.exe 35 PID 1500 wrote to memory of 2996 1500 DEM1EE6.exe 37 PID 1500 wrote to memory of 2996 1500 DEM1EE6.exe 37 PID 1500 wrote to memory of 2996 1500 DEM1EE6.exe 37 PID 1500 wrote to memory of 2996 1500 DEM1EE6.exe 37 PID 2996 wrote to memory of 2948 2996 DEM756E.exe 39 PID 2996 wrote to memory of 2948 2996 DEM756E.exe 39 PID 2996 wrote to memory of 2948 2996 DEM756E.exe 39 PID 2996 wrote to memory of 2948 2996 DEM756E.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe"C:\Users\Admin\AppData\Local\Temp\58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\DEM712A.exe"C:\Users\Admin\AppData\Local\Temp\DEM712A.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\DEMC83F.exe"C:\Users\Admin\AppData\Local\Temp\DEMC83F.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\DEM1EE6.exe"C:\Users\Admin\AppData\Local\Temp\DEM1EE6.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\DEM756E.exe"C:\Users\Admin\AppData\Local\Temp\DEM756E.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\DEMCC54.exe"C:\Users\Admin\AppData\Local\Temp\DEMCC54.exe"6⤵
- Executes dropped EXE
PID:2948
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD580baf2316f95bba4096cc0df37030d04
SHA1eacd9e09f0382a3a2cbed32db1f35ccfd573013a
SHA25675c8fce3201b982e11c74f3040330fa8fc234f97c92eb234fed56935eb44d61e
SHA512b80701963928cfb4a977c2b79e50ccdf436388e855697e892854c70ca89f4428eb67f8da2202aeaa4c3ab122731034f445341019480555dacccab59ecfc39dd7
-
Filesize
20KB
MD5d704eef49fddac0969a61ce4a2756e92
SHA19b83f388b7b7470fa74db551e6d98b465a6cdf6f
SHA256d06a9d8504b85ae68acc41a999b37da2257c14a4878978ed20fb615dd4eb57d6
SHA512632ada073a0edcf613e5d6ec9f12b6a935f7bc2dbb0bf70cce1431ecdad848273c13bf0568359b9b46ed6501fffbc252eef105b2b6641168cf502e54f7b01dbc
-
Filesize
20KB
MD5a372b199f222137c815f05096f9d7816
SHA16c7e53533c79dba881985d4d1cd7936c29c35072
SHA2562df8e30585fd4c24c2919438a892367fd986905d1ed14b5fb0ee6d6c876e1c5e
SHA5122e21970393eac3369047edcb27b24aa824f9445dd456e4c38e47c6341bd6b1e026641559e5ab6d4b1a9aba42ec1c5bf1b2c8fe2c6425e0588a79701c78f05052
-
Filesize
20KB
MD557f751c84c9f5727a864eb24419d3208
SHA1f90e405460cf2c57bc10c89ff588e8836973f356
SHA256be1a5de70245f3dd2b8836ec28447fc90f08d9a658a5d90488e04d2b76ee2c2c
SHA5123f49b4c1a3a5db7f85789cc62a45978a921f3161c59d0f3c887e3805f0ec17f37482dfb7a1da8ed56a80a6aa361ea6f23e0f56ff8cfb0106149310a8c9b2c79f
-
Filesize
20KB
MD589c7c8a86064b6a7591b85f5ca652341
SHA1a6620936d5d78c081040b39b12f8399dd6dd3667
SHA256068b222e8f8d054680105fb096422e7c32893e0c87262fae761c8d800ae78ad1
SHA512876120ea6d0c162fef0e5fdcbbac68560bf1f974b88f4c88c57e5d4dca89de7a2212b49742a4a2ce21741b654e6bc44d744b8180d19d599eaed7c183d83567be