Analysis
-
max time kernel
126s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe
Resource
win10v2004-20241007-en
General
-
Target
f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe
-
Size
16KB
-
MD5
877b0e59711c9db27810f9973e7e5a5e
-
SHA1
de068d936c493b86214b5f2762ac77a05c3482d4
-
SHA256
f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b
-
SHA512
23be0a43d326a461ecb5c1c7f11222214815720b60e5b6954ae3cbae5859a46da2b9386d9993aa969a77ad754edc13d5bb1038541414b33cdca42fe9111c71c8
-
SSDEEP
384:ulis+wQ7rmUMGid0Z3Nbe1xFCiCGZ74+I:f9hM2dB4XAGZkt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2448 trueupdater.exe -
Loads dropped DLL 1 IoCs
pid Process 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trueupdater.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30 PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30 PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30 PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30 PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30 PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30 PID 1380 wrote to memory of 2448 1380 f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe"C:\Users\Admin\AppData\Local\Temp\f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\trueupdater.exe"C:\Users\Admin\AppData\Local\Temp\trueupdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5062a9dc2bba25b6805389ba7235c22d4
SHA1d4caca383951ab41d4fbd57c06e934fa1f8eec5b
SHA25663f093f18be26c7fb08588db9a6897414041bc9f2cc6f88dce2aab3a878b62a1
SHA512f199a7343b004d9db14a2ea486d0e52b065373d9c3e49b4f7aa9c811474320ffb37c67f34bd00087eebf008baca26589f9c3656400649ea2156db3f3d30591f1