Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe
Resource
win10v2004-20241007-en
General
-
Target
9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe
-
Size
2.4MB
-
MD5
ed9a993daeafc7ba30d34cc057b20469
-
SHA1
01018e85e4455be87b2fd027ce4062b801f3b9f8
-
SHA256
9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141
-
SHA512
7ee3fc2d6d557b65992c9f4fca0ce9e88414e0b37691d1bf3f6fe7eb5b94766f5633be084c9a7411fbba0b2e3529d46fd46019309ebc26613e1074dbfca06a73
-
SSDEEP
49152:S/hkt8OlV/GqHljzI78zE5NzX6Y2BhwIL/SWQZkt0IGROmHqzqVxewA:SCBL+aFzY35XcHPQKt0IO9qu2
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3040 WmiPrvSE.exe 2052 WmiPrvSE.exe 2708 WmiPrvSE.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2208 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2208 2512 9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe 30 PID 2512 wrote to memory of 2208 2512 9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe 30 PID 2512 wrote to memory of 2208 2512 9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe 30 PID 2512 wrote to memory of 2208 2512 9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe 30 PID 2392 wrote to memory of 3040 2392 taskeng.exe 34 PID 2392 wrote to memory of 3040 2392 taskeng.exe 34 PID 2392 wrote to memory of 3040 2392 taskeng.exe 34 PID 2392 wrote to memory of 3040 2392 taskeng.exe 34 PID 2392 wrote to memory of 2052 2392 taskeng.exe 35 PID 2392 wrote to memory of 2052 2392 taskeng.exe 35 PID 2392 wrote to memory of 2052 2392 taskeng.exe 35 PID 2392 wrote to memory of 2052 2392 taskeng.exe 35 PID 2392 wrote to memory of 2708 2392 taskeng.exe 36 PID 2392 wrote to memory of 2708 2392 taskeng.exe 36 PID 2392 wrote to memory of 2708 2392 taskeng.exe 36 PID 2392 wrote to memory of 2708 2392 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe"C:\Users\Admin\AppData\Local\Temp\9742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn WmiPrvSE /tr "C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe" /sc minute /mo 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2208
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A8DA9D21-9213-47EC-9A15-F0F8F35BE688} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exeC:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe2⤵
- Executes dropped EXE
PID:3040
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exeC:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe2⤵
- Executes dropped EXE
PID:2052
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exeC:\Users\Admin\AppData\Roaming\Microsoft\WmiPrvSE.exe2⤵
- Executes dropped EXE
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5ed9a993daeafc7ba30d34cc057b20469
SHA101018e85e4455be87b2fd027ce4062b801f3b9f8
SHA2569742a48507e43e7c069a44639ac433b35394094787c899de375fcf302bb79141
SHA5127ee3fc2d6d557b65992c9f4fca0ce9e88414e0b37691d1bf3f6fe7eb5b94766f5633be084c9a7411fbba0b2e3529d46fd46019309ebc26613e1074dbfca06a73