Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe
Resource
win10v2004-20241007-en
General
-
Target
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe
-
Size
685KB
-
MD5
67a61a5b722dd63bbe160c472b845e1a
-
SHA1
1490776613fd477ef1812ef5d620b9e4867f390a
-
SHA256
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b
-
SHA512
ea4fce6129277fcb96309d49a08e2ae16489ec0bd75e2d5dc6413be80fefbd97581c924726a00ebd81e67041328db11fd3bca4d2374142b3b86e90a725c42c7b
-
SSDEEP
12288:3Z8nkF9oy1ADvMKdhAS0jjLz7hoo3RpEcvALALdt/xBot/FcEic/3IWVscSfVo8s:3Z8nkF9oySiLz72ooSru/so3V9xmA0k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 service.exe 2900 service.exe -
Loads dropped DLL 3 IoCs
pid Process 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 2864 service.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Service Application = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service.exe" service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2672 set thread context of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2864 set thread context of 2900 2864 service.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz service.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 2672 wrote to memory of 296 2672 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 296 wrote to memory of 2916 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 32 PID 296 wrote to memory of 2916 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 32 PID 296 wrote to memory of 2916 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 32 PID 296 wrote to memory of 2916 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 32 PID 296 wrote to memory of 2864 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 34 PID 296 wrote to memory of 2864 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 34 PID 296 wrote to memory of 2864 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 34 PID 296 wrote to memory of 2864 296 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 34 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35 PID 2864 wrote to memory of 2900 2864 service.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\remove12384.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685KB
MD5f7039414473e6b41e7e0fa849e3fb9b9
SHA102f8d155fa716f334482bf2850b02f67edea0001
SHA2566f1ba1b75d3f3e639765e038d773c6e83614c9b6327c392db3d87c414cbe5443
SHA5121cb3e18c8fba79ca53ced20a5490aa1ab3e78b428a60f6dea168bb44d492830a68b8e68aaf65a80dafed94156d18e21bc60382531befa5605b7307b65aa53a93
-
Filesize
51B
MD547a8ba1ac93ed45a6c0730f839996ebe
SHA1cb866994aae108d550d8e86de8f72113385ea013
SHA256ad13a0f3f6c294009c8909aa19cb7a0b92e4cc8a39345a004cfdf0edd51b5f9e
SHA512bdd6d1897495836b837b570add6d8a28a81dc9d67524af966d77e4c074e771628de4a7e2147c6a40336276cf03cd4014a91c461cc409f96fed0ca5ec425bb8cc
-
Filesize
267B
MD5069a41c368782098ed3231fb21b1bf6a
SHA1588c355e4b622e6f996585539028400da3c928d3
SHA2566af02d1e17de464995a473da5e9c9a9be554b4ac1b95c59d2ea2feb6d836fe3b
SHA512cd62e817b2d5366ca1a9f2ff89f6a481e8c9c00b371f0d23e9df58d11e453c7b731ac2fdd079697e2a434a0e2049fbfec919643838191e9844fd904601c86373