Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe
Resource
win7-20240903-en
General
-
Target
7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe
-
Size
416KB
-
MD5
74a54e7ceeb7bd23ed45a3d259257480
-
SHA1
45d5471cd50f0a970c8c1e11e770bf59e626567b
-
SHA256
7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f
-
SHA512
7c5f4f4b59a271ac531a357f5777671119a01e4c367f1b068d019054e24a8a92fd81580d021dd259c5f3776184bfabbe2dcdb1d6d0cb316140c8d1719c54719a
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7TQ:ITNYrnE3bm/CiejewY5vb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2060 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2060 2544 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 31 PID 2544 wrote to memory of 2060 2544 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 31 PID 2544 wrote to memory of 2060 2544 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 31 PID 2544 wrote to memory of 2060 2544 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 31 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32 PID 2060 wrote to memory of 2296 2060 ximo2ubzn1i.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe"C:\Users\Admin\AppData\Local\Temp\7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5a69b985f6bd9d11ec394480eb7c14d0d
SHA17a8de41975f9812e9cb41a7ee315ca86cc87a6fd
SHA25639ec6c779dcd94fafbecc6a97f77842d0f6709dd211086fe3857e0bafcb0519d
SHA5121cd8c6f963a09524047cb590c49fe14b3d42c90f1bba5460f591cbb2088bdfaf9d4849729e71a0a0bdd958a574a9ae3e9f2cf60ca7ec2fabe1866c9e2132e9f3