Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe
Resource
win7-20241023-en
General
-
Target
cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe
-
Size
255KB
-
MD5
d8a507033ff81ad56143528fae985f90
-
SHA1
ae3a2beeed87ae6781e9d1bacd4fb00b70193038
-
SHA256
cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398
-
SHA512
69cd754e185e719f1a90b1b8244c96edcf9e685e50709b86e0a4e4bdbd1a25dae126c44b9b856d6b66281c6ae9c9a5d2df8716312725838e67f941b7bb796f4f
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ+s:EeGUA5YZazpXUmZhls
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 2836 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2372 wrote to memory of 2836 2372 cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe 31 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32 PID 2836 wrote to memory of 2680 2836 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe"C:\Users\Admin\AppData\Local\Temp\cb33a5e49c9f447351d5bd8cf835dbefbe5f1778595c3e2423fc74c3a25f5398N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5d2e65acf3f9fd684529d26ba6a0f1db4
SHA133b14fe274e46b7d94da8787f8b9882846b4f5ea
SHA2568aeaba68d7e7ef71134f452d98f08eb5f8f6879cf5c7957398ec05d45c56046a
SHA5127820a947d677b8f1e9f78694c75564b9718a705705b38a77ad43ddf2598e3b541f5f5dc4f7f613aaad38c1474fffe942f1129bb434f014d6c7e0f89d1b33bfc7