Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe
Resource
win7-20240903-en
General
-
Target
1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe
-
Size
416KB
-
MD5
8ee1202070859f2d76314d23d3da915e
-
SHA1
038d05f716d6ed63977b33ca8395ac77e3c8a1e5
-
SHA256
1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9
-
SHA512
aac7016ae7d3ed110aff433d3d8aad141f1eab4ff8cdc0a06cac5cb872f48796c90bea77a721a5ef3d78cf85e7e578672f3d65d94f843e344ded4f72511247af
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7Tw:ITNYrnE3bm/CiejewY5vz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1684 2960 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe 30 PID 2960 wrote to memory of 1684 2960 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe 30 PID 2960 wrote to memory of 1684 2960 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe 30 PID 2960 wrote to memory of 1684 2960 1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe 30 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31 PID 1684 wrote to memory of 2200 1684 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe"C:\Users\Admin\AppData\Local\Temp\1a949ad62acf5e8d63ef83a18c2cd3ec6adfdff67a560266be0b31f3ca107fa9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD51991b9f405b0ef53c5f2ec521e762fd4
SHA1e0a5997e674d3b853f92bdc76b3220133174b61a
SHA256ed3f4375116d07e6cc9a0d8fea0da569f0de8ae2e09d2e67c91b5b3315824c28
SHA512c0eb7d1c1081929ba924cc3a5f976406de25ea02a36a6ad69550e5701899a84318a883450b89d4e39466a01e69a28bbf4637bcead571eb51d820041709e20c68