Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe
Resource
win10v2004-20241007-en
General
-
Target
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe
-
Size
685KB
-
MD5
67a61a5b722dd63bbe160c472b845e1a
-
SHA1
1490776613fd477ef1812ef5d620b9e4867f390a
-
SHA256
dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b
-
SHA512
ea4fce6129277fcb96309d49a08e2ae16489ec0bd75e2d5dc6413be80fefbd97581c924726a00ebd81e67041328db11fd3bca4d2374142b3b86e90a725c42c7b
-
SSDEEP
12288:3Z8nkF9oy1ADvMKdhAS0jjLz7hoo3RpEcvALALdt/xBot/FcEic/3IWVscSfVo8s:3Z8nkF9oySiLz72ooSru/so3V9xmA0k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2428 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 service.exe 2856 service.exe -
Loads dropped DLL 3 IoCs
pid Process 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 2804 service.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Service Application = "C:\\Users\\Admin\\AppData\\Local\\Temp\\service.exe" service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3008 set thread context of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 2804 set thread context of 2856 2804 service.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz service.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3008 wrote to memory of 3060 3008 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 30 PID 3060 wrote to memory of 2428 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 3060 wrote to memory of 2428 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 3060 wrote to memory of 2428 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 3060 wrote to memory of 2428 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 31 PID 3060 wrote to memory of 2804 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 33 PID 3060 wrote to memory of 2804 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 33 PID 3060 wrote to memory of 2804 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 33 PID 3060 wrote to memory of 2804 3060 dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe 33 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34 PID 2804 wrote to memory of 2856 2804 service.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"C:\Users\Admin\AppData\Local\Temp\dd7f06cb4111b824be896e9065b5e1d1297c9e0096ac22f8200f9e1dff8f545b.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\remove16187.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
686KB
MD5600b0ae60d1d5a91e9bffb914bda8221
SHA1149a63eeb539f4faf70efa89499b3ee9a6117e80
SHA256eb5fa35163446c239f118c9dbcbc210f644019201f96462481693dbae8121e05
SHA512ee142627992009f92fb98f4c29f409990e1e17617e6fc5f504e4764a17810c0e2b663cc75530a380b07a92c8d0ddce2a062b8d7c7c83fe0e924a1f51c62caf00
-
Filesize
51B
MD547a8ba1ac93ed45a6c0730f839996ebe
SHA1cb866994aae108d550d8e86de8f72113385ea013
SHA256ad13a0f3f6c294009c8909aa19cb7a0b92e4cc8a39345a004cfdf0edd51b5f9e
SHA512bdd6d1897495836b837b570add6d8a28a81dc9d67524af966d77e4c074e771628de4a7e2147c6a40336276cf03cd4014a91c461cc409f96fed0ca5ec425bb8cc
-
Filesize
267B
MD5069a41c368782098ed3231fb21b1bf6a
SHA1588c355e4b622e6f996585539028400da3c928d3
SHA2566af02d1e17de464995a473da5e9c9a9be554b4ac1b95c59d2ea2feb6d836fe3b
SHA512cd62e817b2d5366ca1a9f2ff89f6a481e8c9c00b371f0d23e9df58d11e453c7b731ac2fdd079697e2a434a0e2049fbfec919643838191e9844fd904601c86373