Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wdxsx.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
wdxsx.exe
Resource
win10v2004-20241007-en
General
-
Target
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe
-
Size
315KB
-
MD5
5b9271a33d0ac9c8b59bb27cef2b3834
-
SHA1
98f16671e6b09b68721a73bba9c5a15e7c4ee664
-
SHA256
1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec
-
SHA512
b4d7e76b92b641ec2ae6702e5c955ea60ff8b7a5b77e1456fea5118398343c3501dd1f6b1b1e82d60ee5834c583cf22d74ff0b2455e2939e6e88f99562bfb2b6
-
SSDEEP
3072:J1NjcVVnLpPuGDFsb5Rchf8BS6YbMZlfBtwTrSJxbVrWLK9omNYFkPthSPhI/cag:zNeZwbcu2mYmJxbnokteYwHqyTV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 wdxsx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdxsx.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3304 wrote to memory of 1948 3304 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 83 PID 3304 wrote to memory of 1948 3304 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 83 PID 3304 wrote to memory of 1948 3304 1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe 83 PID 1948 wrote to memory of 4136 1948 wdxsx.exe 84 PID 1948 wrote to memory of 4136 1948 wdxsx.exe 84 PID 1948 wrote to memory of 4136 1948 wdxsx.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe"C:\Users\Admin\AppData\Local\Temp\1f0dfaeee8860dd10d592b0632dc1ef8c2fa1bc9681e0f9e29ed632f2260abec.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\wdxsx.exeC:\Users\Admin\AppData\Local\Temp\wdxsx.exe C:\Users\Admin\AppData\Local\Temp\tfygxpzyta2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\wdxsx.exeC:\Users\Admin\AppData\Local\Temp\wdxsx.exe C:\Users\Admin\AppData\Local\Temp\tfygxpzyta3⤵PID:4136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5004bc7879e3c807507d2b7d13a621d78
SHA1099640fec1e090923315f11ebfcc287409a247c0
SHA2568ab5adbc3f6292d67119ff52c25b57d1314fe52961f9236796d06694f509bc9c
SHA512e5f117d136f9c117538ef0890969fdd55927ed49b00287213985eeea04a8ca0f47e5a6180ae076b68ead58f6249689fd6fc51d5be39460786fd9efa776a4f442
-
Filesize
5KB
MD538eada4dc49581c3cae9eee827227c1f
SHA1e964cece3ca9708f3df691c860c5cb2d72e75ab1
SHA2569677c7d4f551e18f7772fa166ebed8d76c7a7928f747c63e8374a80a45342bd2
SHA5124c99eb1d9e2f9a573d71c77cd53f7d10880157b84a182081f1378986b42f9079c84ad8529d53f89dfa3a7ecf5ab3c7cd8ec32ebe3d22b4e5a245175a47d0f94e
-
Filesize
4KB
MD5c23f252a4352c30c3473e3fbbdff84f0
SHA1d7240c2f65d1509e51c8461d835a1b14e167ad4f
SHA2566bc4f989450cc6a3d1e220371fc64029bfac461429b035b8db90ae56af7dae8f
SHA51287ef7be0450bd6b40d1d63fdcb66448b8aee04ec9627dc2aacde848ea83e042763d8ce8b1e94547a00b316ce29447c5a036ca92e3baf5315088cdc473edecbd1