Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe
Resource
win7-20240903-en
General
-
Target
7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe
-
Size
416KB
-
MD5
74a54e7ceeb7bd23ed45a3d259257480
-
SHA1
45d5471cd50f0a970c8c1e11e770bf59e626567b
-
SHA256
7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f
-
SHA512
7c5f4f4b59a271ac531a357f5777671119a01e4c367f1b068d019054e24a8a92fd81580d021dd259c5f3776184bfabbe2dcdb1d6d0cb316140c8d1719c54719a
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7TQ:ITNYrnE3bm/CiejewY5vb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2756 2364 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 30 PID 2364 wrote to memory of 2756 2364 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 30 PID 2364 wrote to memory of 2756 2364 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 30 PID 2364 wrote to memory of 2756 2364 7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe 30 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31 PID 2756 wrote to memory of 2860 2756 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe"C:\Users\Admin\AppData\Local\Temp\7ee080c3df90000c77d68fcb1248a7856ef5a7fd5b964ff0006a7c9ee336dd7f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD563c66383c7f06a2845dcdc0d365d8669
SHA117a031651a6666a8167fa16dbbec340ed1ade5d3
SHA256afbe6856a6bdc7a932ccab408a85b0b424024662287532753fb6f727fa7ae713
SHA512a26d566fadf8e9dddc5d3e17b4b722be10b70b3de78d216a20fc84f2889f8caaba0ee962f5a9643285699c760db6a5d8a1bd421e61fc5ac0957b35586c3227d4