Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 23:07
Behavioral task
behavioral1
Sample
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe
Resource
win10v2004-20241007-en
General
-
Target
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe
-
Size
6.9MB
-
MD5
5622a605e225afc992d439a3b9a397cd
-
SHA1
18ab455c8a01e3a57e0f5819b57d550cd465ceff
-
SHA256
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87
-
SHA512
f5ac5aaab98b88fd45fec2587d425327216720e37e2480e4d8f87d012a44e6a3b47e389802369619f96eea359920f96efd5eaec069dc3dfd85520004b2832a96
-
SSDEEP
196608:3rJH0DmPeNTfm/pf+xk4dWRGtrbWOjgWyz:ypy/pWu4kRGtrbvMWyz
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Built.exeBuilt.exepid Process 2828 Built.exe 2800 Built.exe 1204 -
Loads dropped DLL 4 IoCs
Processes:
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exeBuilt.exeBuilt.exepid Process 2448 5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe 2828 Built.exe 2800 Built.exe 1204 -
Processes:
resource yara_rule behavioral1/files/0x000500000001998d-30.dat upx behavioral1/memory/2800-32-0x000007FEF6360000-0x000007FEF6948000-memory.dmp upx behavioral1/memory/2800-35-0x000007FEF6360000-0x000007FEF6948000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exeBuilt.exedescription pid Process procid_target PID 2448 wrote to memory of 2828 2448 5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe 30 PID 2448 wrote to memory of 2828 2448 5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe 30 PID 2448 wrote to memory of 2828 2448 5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe 30 PID 2448 wrote to memory of 2828 2448 5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe 30 PID 2828 wrote to memory of 2800 2828 Built.exe 31 PID 2828 wrote to memory of 2800 2828 Built.exe 31 PID 2828 wrote to memory of 2800 2828 Built.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe"C:\Users\Admin\AppData\Local\Temp\5dcef59594193c72606624053f902c3e2725e328168215ce03273d13e8d39a87.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5bb46b85029b543b70276ad8e4c238799
SHA1123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA25672c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA5125e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31
-
Filesize
6.9MB
MD581dbe44b09d1dec462b487fc8013a777
SHA14fbdbdcb521f9d7a35233f0a82efe07835b72f62
SHA256556142e45f303ecce52e9412f295191fd018ac4624910d77d8ee2d9e36ed81b1
SHA51210c0d6b9a96b378907d12dc61691c28f598dd9e8864da394553e90021493ca0971aecb998d2f13870a5b530dab0a6a5611e2f9ff7e675098b00ef296c232ff0f