Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe
Resource
win7-20241010-en
General
-
Target
37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe
-
Size
331KB
-
MD5
95f3f8ac930634819d32469d82a229fb
-
SHA1
f9725793b66792f53380440d88edbc599d078504
-
SHA256
37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49
-
SHA512
0e0c976f7a153bf58d18bde47241b6a4101f61f6b632904165f67ab323c6a79397478f3a2c4d39841b8f2ca6f20c6e2e975938f0a57ac2be8147ee225f88dd1c
-
SSDEEP
6144:G+Noo+GdZhrbK3YS2WfD18K8fVKpS94h89Bq4:G+Noo1ZhCp2WfD1gfcpS98UBr
Malware Config
Extracted
systembc
185.173.39.49:4001
Signatures
-
Systembc family
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job 37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe File opened for modification C:\Windows\Tasks\wow64.job 37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2980 2716 taskeng.exe 31 PID 2716 wrote to memory of 2980 2716 taskeng.exe 31 PID 2716 wrote to memory of 2980 2716 taskeng.exe 31 PID 2716 wrote to memory of 2980 2716 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe"C:\Users\Admin\AppData\Local\Temp\37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2256
-
C:\Windows\system32\taskeng.exetaskeng.exe {08AB2EE0-1551-4715-AA43-674CF91581D9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exeC:\Users\Admin\AppData\Local\Temp\37f820fa2cfe1030b9a20be1e124e31354b8c615dd467da63d812057faff2b49.exe start2⤵PID:2980
-