Analysis
-
max time kernel
132s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe
Resource
win7-20240903-en
General
-
Target
007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe
-
Size
1.1MB
-
MD5
6763ecebb557237980b32c8a5872bae0
-
SHA1
69d6500dabfe1d27fcf2586dff0cb8d51057c1fd
-
SHA256
007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219
-
SHA512
09e063dde5da8e4032e0c691921f667d00d7d47766b5cf62b5d4f17cb83bc5c989c32eae9ed075a5d182ed3ecd9e89cd805722f7cf629ae2d5dc91542effa867
-
SSDEEP
24576:TA6JVOI4Ltgdc2fNjIu0W8lJDebGjNOvEER9Fsr/zwRC:T3OI4xKcaj4Wee2sjY
Malware Config
Extracted
systembc
wodresomdaymomentum.org
-
dns
5.132.191.104
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3200 created 3456 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 56 PID 816 created 3456 816 hggilq.exe 56 -
Systembc family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winutil.vbs 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe -
Executes dropped EXE 3 IoCs
pid Process 816 hggilq.exe 1780 hggilq.exe 780 hggilq.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3200 set thread context of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 816 set thread context of 1780 816 hggilq.exe 101 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hggilq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hggilq.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 816 hggilq.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe Token: SeDebugPrivilege 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe Token: SeDebugPrivilege 816 hggilq.exe Token: SeDebugPrivilege 816 hggilq.exe Token: SeDebugPrivilege 780 hggilq.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 3200 wrote to memory of 3540 3200 007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe 96 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101 PID 816 wrote to memory of 1780 816 hggilq.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe"C:\Users\Admin\AppData\Local\Temp\007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe"C:\Users\Admin\AppData\Local\Temp\007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\ProgramData\ahqcx\hggilq.exe"C:\ProgramData\ahqcx\hggilq.exe"2⤵
- Executes dropped EXE
PID:1780
-
-
C:\ProgramData\ahqcx\hggilq.exeC:\ProgramData\ahqcx\hggilq.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816
-
C:\ProgramData\ahqcx\hggilq.exeC:\ProgramData\ahqcx\hggilq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56763ecebb557237980b32c8a5872bae0
SHA169d6500dabfe1d27fcf2586dff0cb8d51057c1fd
SHA256007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219
SHA51209e063dde5da8e4032e0c691921f667d00d7d47766b5cf62b5d4f17cb83bc5c989c32eae9ed075a5d182ed3ecd9e89cd805722f7cf629ae2d5dc91542effa867