Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe
Resource
win10v2004-20241007-en
General
-
Target
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe
-
Size
60KB
-
MD5
cf254bd70e12a2268931fff43de470e0
-
SHA1
811c8dd65ec4f0d45a0d334a6dac1f9de4a3b634
-
SHA256
de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304
-
SHA512
7a173a8a7cf414ba28edb64fa8d88608e4dd39eca47caed3d378f04e49ee839aa7693be0c09c76a407758dc835a2cffdb7f7b9da5a88e032c24000d862132886
-
SSDEEP
1536:ysSH2LffjwHIG571Zpw25L0zF/w12T30S5z4+:gkffMHdZpw2dO/w12Tk3+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fmtoav.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 fmtoav.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmtoav = "C:\\Users\\Admin\\fmtoav.exe" fmtoav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmtoav.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe 2092 fmtoav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 2092 fmtoav.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2092 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 30 PID 2100 wrote to memory of 2092 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 30 PID 2100 wrote to memory of 2092 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 30 PID 2100 wrote to memory of 2092 2100 de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe 30 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29 PID 2092 wrote to memory of 2100 2092 fmtoav.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe"C:\Users\Admin\AppData\Local\Temp\de5a463ab460f8d517a678001b0532dfe1a9f40bf0de2a5c77d4631cb08b6304N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\fmtoav.exe"C:\Users\Admin\fmtoav.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5890a14fcb2300df65a93e20f4349f6d5
SHA110169aec41c7a1e9c7ebbc68da9d4af9ff96b85a
SHA256aec90e8cd8050d4f040501063cdc4800d818a23bf991587cee05ffeee5214833
SHA512f101f425a157acc43ea93c4ef52cb85fef60fca4384233a6c1b0174bb4316669f238d5f6211a702f4b967928a1814dbfd59d593736944747eb0966a225f8440d