Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe
Resource
win10v2004-20241007-en
General
-
Target
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe
-
Size
1.9MB
-
MD5
0f116a860d055461e73e35536787c02f
-
SHA1
fb7b079ca9599aa530920ce445cc33cdc4f62883
-
SHA256
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
-
SHA512
c7ad85c56568a6c8a3749cdb8030d84d3830f1c23448472bc6255dec8dfab5205e462cb2f7990a019e9885718f9d040a442638f66f33da5509e2c68508614b20
-
SSDEEP
49152:xVg5tQ7a/05spYndBKm6SJxKogrSWzWZ6+2ULK5:/g565hJJAWWKZ6+Z
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
Clinton.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Clinton.vbs Clinton.exe -
Executes dropped EXE 1 IoCs
Processes:
Clinton.exepid Process 2564 Clinton.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cba-9.dat autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2672 2564 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exeClinton.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clinton.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exeClinton.exepid Process 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 2564 Clinton.exe 2564 Clinton.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exeClinton.exepid Process 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 2564 Clinton.exe 2564 Clinton.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exeClinton.exedescription pid Process procid_target PID 4736 wrote to memory of 2564 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 83 PID 4736 wrote to memory of 2564 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 83 PID 4736 wrote to memory of 2564 4736 1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe 83 PID 2564 wrote to memory of 3344 2564 Clinton.exe 86 PID 2564 wrote to memory of 3344 2564 Clinton.exe 86 PID 2564 wrote to memory of 3344 2564 Clinton.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe"C:\Users\Admin\AppData\Local\Temp\1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\teepees\Clinton.exe"C:\Users\Admin\AppData\Local\Temp\1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85.exe"3⤵PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 7203⤵
- Program crash
PID:2672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2564 -ip 25641⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1.9MB
MD50f116a860d055461e73e35536787c02f
SHA1fb7b079ca9599aa530920ce445cc33cdc4f62883
SHA2561ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
SHA512c7ad85c56568a6c8a3749cdb8030d84d3830f1c23448472bc6255dec8dfab5205e462cb2f7990a019e9885718f9d040a442638f66f33da5509e2c68508614b20