Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe
Resource
win7-20240903-en
General
-
Target
6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe
-
Size
416KB
-
MD5
f6eab5077affa3e10ba6bdca2dc59e40
-
SHA1
21e27130773611fe0b3fd1fc605e7706895c41eb
-
SHA256
6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8d
-
SHA512
6ad02e39595d1fb3122ecd9aa1a7b04cd118312228ad2c9b55e3af7c2efd84b520fad09f5cdcdd590d93987b6af5e4755ff1d9defc4c08709c1b16d61c91b6af
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7y:ITNYrnE3bm/CiejewY5vp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 1596 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2744 1596 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe 30 PID 1596 wrote to memory of 2744 1596 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe 30 PID 1596 wrote to memory of 2744 1596 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe 30 PID 1596 wrote to memory of 2744 1596 6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe 30 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31 PID 2744 wrote to memory of 2732 2744 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe"C:\Users\Admin\AppData\Local\Temp\6f2e9c6c389f07c992bdbc227645b9940a117f7ee23e37dbb0c3afcdbe3d2b8dN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD58c82b62c0c6ffc4abcf615bccf378c20
SHA17206a8f37151f5e4ab4abc9eb83c7929be7cdc17
SHA256d18b45cc12805cc838622874b6e376b0711d64063c6cfa007262203ec60dd5e9
SHA51210f279be99a9be01b39c704a13db6a723a9d00319ccd100682136377965595c05c9f68ea77389390954a0d9876b43abb4dbd87376b8ad0c0b4074fa6d88c622b