Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
scan_241205-801_draft_PO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scan_241205-801_draft_PO.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
scan_241205-801_draft_PO.exe
-
Size
1.2MB
-
MD5
16df1bbb45f31ef099862d1df04b9741
-
SHA1
e9c1056bc30a3817d84656a944b39190cbb1b7c9
-
SHA256
b5486818c1913895b913ace02e94fee62a6468b3df96abd6c75c863499873dd2
-
SHA512
083ed41b277bfdaa0876c756868acb0286d22eb498aa4f18638a258a86559ddc6bce35d777b259f71b7d392291d5ee0ad346671931c562c89bafc4c555d877cb
-
SSDEEP
24576:tmwFwYo/knJ5vkeSTejf+WNvXgd93W0wbenPc15QClzZ:gkVosnJSeSTw+WNfgdlZ0iPc/Q+zZ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2700 scan_241205-801_draft_PO.exe 2700 scan_241205-801_draft_PO.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\afholdshotellers\nineholes.Uni179 scan_241205-801_draft_PO.exe File opened for modification C:\Windows\resources\torvind\Microspecies102.gip scan_241205-801_draft_PO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 324 2700 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan_241205-801_draft_PO.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 324 2700 scan_241205-801_draft_PO.exe 31 PID 2700 wrote to memory of 324 2700 scan_241205-801_draft_PO.exe 31 PID 2700 wrote to memory of 324 2700 scan_241205-801_draft_PO.exe 31 PID 2700 wrote to memory of 324 2700 scan_241205-801_draft_PO.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\scan_241205-801_draft_PO.exe"C:\Users\Admin\AppData\Local\Temp\scan_241205-801_draft_PO.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 4882⤵
- Program crash
PID:324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD58566807b0dbb1131e5c9cd4ca8dc90b2
SHA1d8279adfb8b6794f092dc5145f1f818d2207eace
SHA25665b6950878c1c94ef6d82733bfa7c16d36f614c7e7145591cb2b69cc5f41059b
SHA5124492066dc6e21934768fd8ac977e0ecfdf6e9b16799c6f312835591da5ebec780bac1cb072289acd6d75a9833963c044572139ad026382862b83bb6fb3f87a43
-
Filesize
74B
MD516d513397f3c1f8334e8f3e4fc49828f
SHA14ee15afca81ca6a13af4e38240099b730d6931f0
SHA256d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA5124a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3
-
Filesize
1B
MD58ce4b16b22b58894aa86c421e8759df3
SHA113fbd79c3d390e5d6585a21e11ff5ec1970cff0c
SHA2568254c329a92850f6d539dd376f4816ee2764517da5e0235514af433164480d7a
SHA5122af8a9104b3f64ed640d8c7e298d2d480f03a3610cbc2b33474321ec59024a48592ea8545e41e09d5d1108759df48ede0054f225df39d4f0f312450e0aa9dd25
-
Filesize
2B
MD525bc6654798eb508fa0b6343212a74fe
SHA115d5e1d3b948fd5986aaff7d9419b5e52c75fc93
SHA2568e5202705183bd3a20a29e224499b0f77a8273ee33cd93cca71043c57ad4bdfc
SHA5125868c6241ed3cfcc5c34bfe42e4b9f5c69e74975e524771d8c9f35cafc13fd01cd943ec4d8caefee79a1f4a457e69d20b7a86f88db83a5bc3e6bd8a619972898
-
Filesize
3B
MD54e27f2226785e9abbe046fc592668860
SHA128b18a7f383131df509f7191f946a32c5a2e410c
SHA25601a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d
SHA5122a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb
-
Filesize
56B
MD5a4ed3f074abc98ff25b7d112905e0a73
SHA1f6f54ed5973966385b4aebca4f39a502cb59002a
SHA2563ff81c84e399759fca3120e3e56ef07da7e27e37cbff9f7e5b57c2216c76b655
SHA512d5dee225d8b1a6751b30c12b49c8525cb6b3fbc6394273b28092d498105898597f2f159b2a553ca7d524b29607541b6d2c2c5851a67227840036b03516f9d929
-
Filesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
Filesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4