Analysis
-
max time kernel
35s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe
Resource
win7-20240729-en
General
-
Target
bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe
-
Size
255KB
-
MD5
656ab127d78519e09dc5c5ac3fcfca60
-
SHA1
ae74b886a414c0168f637b48a762822e6029270f
-
SHA256
bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67
-
SHA512
f97fd196a0cdf34359f53dbb4efa9c89bd6f595df4a46cbc978a05d75f84b1cbe06a10c9961709573f2eb90d28c4c50fb60582ce22991a824a0b949d53dc8999
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQS4q:EeGUA5YZazpXUmZh94q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 2820 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 1520 wrote to memory of 2820 1520 bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe 30 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31 PID 2820 wrote to memory of 2476 2820 a1punf5t2of.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe"C:\Users\Admin\AppData\Local\Temp\bd15554bea2ace2d3758ce88c991d0833850ae996e91e6a8774afc1ad5a4be67N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5107f6f98b56b5426d6c6a462c353a437
SHA18de42f3386db324181da1c2dd01dc2b96457c34d
SHA256bf1104970cd0ea6140eb3aca6b721559814e9fd5107a071d0bdfed32c5b72aba
SHA512e5e67e035f895805f0ce085b688c2f0a0fe071ac6d7041cb3d0803f7cffa9209d9ed16e3e2bf1c82a42e762879bfae0632328d1de62d83517285aa3fa52d234a