Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe
Resource
win7-20241023-en
General
-
Target
db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe
-
Size
255KB
-
MD5
77eef7dd7e95bc2abb9b7e1ce8c563f0
-
SHA1
dd22756ba279a54c3fd82009310f5ca4d1198b42
-
SHA256
db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101
-
SHA512
cecf4a7707262d2b19e3ebdf69f0a71d363e86f21351c35e489f8b2dccb8e8ae46e20446c38e4f84a088afceaeea9aa434270f46513e1fbbd46db181f9f9c6a4
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQSM:EeGUA5YZazpXUmZhdM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 2152 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 1628 wrote to memory of 2152 1628 db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe 31 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32 PID 2152 wrote to memory of 2380 2152 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe"C:\Users\Admin\AppData\Local\Temp\db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5b25b6d1044b19612ffd84fadee9abc62
SHA15bd46a2f94a2724ee7ea9432a446baa06d486ffb
SHA2564d078c3ce1396bfdec7c708723146f096e34782d822fae5499a7b9fe5be5f91d
SHA51256ec89505f8d6aca4255143225a4087c0e20760cf3780d853acb36b8205f225aaf23d6c08b259e6ff0330c3b384831a75e49d16a1b36433d0718cb5869122c91