Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe
Resource
win10v2004-20241007-en
General
-
Target
9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe
-
Size
116KB
-
MD5
9fcda4e666ba0d02b67cc8e5714abb60
-
SHA1
9a3057420c1881929536cd91de45e7a8d373890d
-
SHA256
9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731
-
SHA512
fc4bdb3665fcbbaed9e31156f2af040cc7bb45003da7568dc108eedddce20b1f40717663e6274c417b1fdfaf8533a028fdf42905546c949604beecac0b8c2516
-
SSDEEP
1536:mvy50tV44aqwoa9ujdbNyVXa1lgNdaOCt1kTWf:mtWZqwoa9Xa1Idart19f
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 3 IoCs
resource yara_rule behavioral1/memory/680-9-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral1/memory/680-6-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda behavioral1/memory/680-4-0x0000000000400000-0x0000000000409000-memory.dmp family_andromeda -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2320 2504 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 2124 wrote to memory of 680 2124 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 31 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 680 wrote to memory of 2504 680 9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe 32 PID 2504 wrote to memory of 2320 2504 msiexec.exe 33 PID 2504 wrote to memory of 2320 2504 msiexec.exe 33 PID 2504 wrote to memory of 2320 2504 msiexec.exe 33 PID 2504 wrote to memory of 2320 2504 msiexec.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe"C:\Users\Admin\AppData\Local\Temp\9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe"C:\Users\Admin\AppData\Local\Temp\9eb16bdb9d9e6e437c317d53a2328f4b16991824d8ffa31064d7a48165bbc731N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\syswow64\msiexec.exeC:\Windows\syswow64\msiexec.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2684⤵
- Program crash
PID:2320
-
-
-