Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
data.exe
Resource
win7-20240903-en
General
-
Target
data.exe
-
Size
81.2MB
-
MD5
7a71caee51f0980b56420e3a49d2778e
-
SHA1
4827b90daf016b1bb2a07edcc65bad5639d2df69
-
SHA256
7058adbf8289fc200e94acbca32c23cb0dce33bd3bd29c10e0a900a109828342
-
SHA512
9bc6f0fc1d5f3ec1d9fd29723b8fed72671b82fa20387b345d4d14b6c1032aca2fb7353730764c2ac5fe7b3e6dfcf4ebc0e9dbc4c9ed98c1a869b60ed3d41ed3
-
SSDEEP
1572864:Db2bBvAXX++3yEbvFtg8qsRfbMi63N4XZX6jSHREle440fzKM4qt:DUAX7xTkEdO3NkkCREk44qKS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 data.tmp -
Loads dropped DLL 2 IoCs
pid Process 840 data.exe 2376 data.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Trello\app\locales\is-QU1MT.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-TT9G1.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-648FK.tmp data.tmp File created C:\Program Files (x86)\Trello\is-M5RRC.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-PLK45.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-F1RE5.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-N5Q2R.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-V6PEE.tmp data.tmp File created C:\Program Files (x86)\Trello\is-AL3DN.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-36VVG.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-7VLS4.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-7JBNH.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-4NELH.tmp data.tmp File created C:\Program Files (x86)\Trello\is-LEAF0.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-2SA8E.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-77VOB.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-60MHF.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-24VBL.tmp data.tmp File created C:\Program Files (x86)\Trello\is-2LRSP.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-D4D9G.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-D7J95.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-C2PE8.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-CDNSA.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-41NLC.tmp data.tmp File opened for modification C:\Program Files (x86)\Trello\unins000.dat data.tmp File created C:\Program Files (x86)\Trello\is-2RP79.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-91R0R.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-05BMJ.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-HSGC5.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-KLSK2.tmp data.tmp File created C:\Program Files (x86)\Trello\is-6L53G.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-2M14B.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-PJMVE.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-7LHMO.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-GPOIL.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-VA5LL.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-I19HO.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-KPGKF.tmp data.tmp File created C:\Program Files (x86)\Trello\unins000.dat data.tmp File created C:\Program Files (x86)\Trello\app\is-9075U.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-ITBV4.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-GMTRO.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-F020G.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-USLUI.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-DGTS7.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-L21VD.tmp data.tmp File created C:\Program Files (x86)\Trello\is-M9FP5.tmp data.tmp File created C:\Program Files (x86)\Trello\is-D126E.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-QI7PG.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-RT3OF.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-65TIG.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-ONJH0.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-2M8BN.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-A4K8H.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-L2S5E.tmp data.tmp File created C:\Program Files (x86)\Trello\app\is-JRS4C.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-U2IJ6.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-PC9M5.tmp data.tmp File created C:\Program Files (x86)\Trello\app\locales\is-Q88S8.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-JF5QR.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-L4J4M.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-A8JM4.tmp data.tmp File created C:\Program Files (x86)\Trello\assets\is-LVAME.tmp data.tmp File created C:\Program Files (x86)\Trello\is-1N00V.tmp data.tmp -
pid Process 2004 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language data.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 data.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 840 wrote to memory of 2376 840 data.exe 30 PID 840 wrote to memory of 2376 840 data.exe 30 PID 840 wrote to memory of 2376 840 data.exe 30 PID 840 wrote to memory of 2376 840 data.exe 30 PID 840 wrote to memory of 2376 840 data.exe 30 PID 840 wrote to memory of 2376 840 data.exe 30 PID 840 wrote to memory of 2376 840 data.exe 30 PID 2376 wrote to memory of 2004 2376 data.tmp 32 PID 2376 wrote to memory of 2004 2376 data.tmp 32 PID 2376 wrote to memory of 2004 2376 data.tmp 32 PID 2376 wrote to memory of 2004 2376 data.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\data.exe"C:\Users\Admin\AppData\Local\Temp\data.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\is-5MU8D.tmp\data.tmp"C:\Users\Admin\AppData\Local\Temp\is-5MU8D.tmp\data.tmp" /SL5="$50150,79536227,793600,C:\Users\Admin\AppData\Local\Temp\data.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-KLDIB.tmp\ExtractedContent.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5241f46df70e4c5976a15dac5c4bed2c5
SHA1cff78f9ca161bdcaa023cc9fc1cf038e384423f1
SHA256922e9a96539e10c28be59241ffc85655a8d3f9dca2a62685b60b06fa5c08a793
SHA51282ea124d0e50eaace27918b43113066d864131b9c7c50ab7640ce91eaadca24229e1c65ff1ca1a0d9ba9812d6d5216b9107179bdbeabb661aebed5335c4065a1
-
Filesize
4KB
MD513798630fab3b4067136cab018f15e4f
SHA1461129b4231e812a9b88d3a94c769c9533cccb2e
SHA2564e7fa35ece0d853941f239d3f81a469ca748bc5f89fea6e8c9a2ad236da2bf8c
SHA5124ba81f23c4fc1f518e00ded08102c2f91286c829dc9d5204a7eec11e6db96fb66d2ca807436268b6b8ecfa1627a466c8f98e46053a62798e247d19facba6cf47
-
Filesize
3.1MB
MD596e4284d93ad6b7a7e984a2589114947
SHA1a136065002fcbe8cf19c717067c221b3952d8413
SHA2567e0f0655849839a1f48533e00fb78f60f28a43c73119b5bb01c20cc1c8d796b9
SHA512a4ed28826daf48987316bbde6187a7fb2d181f4c64c84bd6eb66ebee72f7b5a726bc7e1627e4332a7a1ef3325f9257eccaaa4331989e5693a2dc659e2eaec0f6