Analysis
-
max time kernel
20s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe
Resource
win7-20240903-en
General
-
Target
b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe
-
Size
416KB
-
MD5
d7c71a53a1e7e06f08d33b918b4af9d0
-
SHA1
0f722acb73a8c7e4c4baac4bb43c796fd45fdfaa
-
SHA256
b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21c
-
SHA512
ffde0213caaa4c05ff90a4ded40fc53e8932f03950f4a69fb3038eada239494d0b8f101019ecf723f11ac3ae022133fcc90887803dcd306d9884f53b756b3677
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7g:ITNYrnE3bm/CiejewY5v7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2812 2088 b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe 30 PID 2088 wrote to memory of 2812 2088 b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe 30 PID 2088 wrote to memory of 2812 2088 b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe 30 PID 2088 wrote to memory of 2812 2088 b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe 30 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31 PID 2812 wrote to memory of 2736 2812 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe"C:\Users\Admin\AppData\Local\Temp\b44255fee58ea9ba6a1c4b0f4fa464c148659a63d4fc1376a944ea3e8836f21cN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5585c0d6cd1004f95874e07463882f833
SHA1d185c1bcd3746e86e93871efbe899054a8400b41
SHA256843a243e19f013c98121b0c306f02ee08c26c866a61d0f612b139547cb8b750a
SHA51267bbab06e6c5cb1f91d8b215d281fc3ff9352c4fecae504a39d41e77a898b6ab155e4cd79cd6986f3c078e200465e96a281fb01805bfd2d52af4cf57042d55c7