Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe
Resource
win7-20240903-en
General
-
Target
af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe
-
Size
415KB
-
MD5
f93a57f8d463af5e4fc8bb2366a985d0
-
SHA1
cf2e8cc76146f95a9c7b93973a4d40545fe55380
-
SHA256
af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbd
-
SHA512
de2a2f64f3fbd95bc7b2f56a2449f78d01a8fff5e2b2aaab82fcf6ce6a557abc5409cc8fc408a825d6c83b03edce9f0bbc80e273469bc046cbac449765e948ea
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUo:ITNYrnE3bm/CiejewY5vH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2360 2148 af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe 30 PID 2148 wrote to memory of 2360 2148 af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe 30 PID 2148 wrote to memory of 2360 2148 af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe 30 PID 2148 wrote to memory of 2360 2148 af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe 30 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31 PID 2360 wrote to memory of 636 2360 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe"C:\Users\Admin\AppData\Local\Temp\af558ccd9263d109c1e8b2cd6dffcc771d7ed61480c102d7bc8a4574f1240fbdN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD54c62c66e274bcb048751c9e0aaf7290d
SHA11b5d93574ec8defce1bd34f742327131644b10de
SHA25608c7aeed39618ae1d3b3c9ab668754fa9152c72b94476a98fc2b0b647b9651bd
SHA5126a9ef41195611ca8b2bf42e7745915d9591f8cc7d65667b1b5ce0fc44f1a346610bab05e3a43388f3c9454cc363c6bff8ed113618f5d419fe7f4840c539dd0ac