Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe
Resource
win7-20240903-en
General
-
Target
20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe
-
Size
11.1MB
-
MD5
d2eea7e948e24d64a97d94f4391f3993
-
SHA1
cd8bf25bf90ffcdc3a4f31e7967555e3be1b6abf
-
SHA256
20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4
-
SHA512
21c21eb5641b13339349314dc5648dc3a1eddb93f3d349f47e34210ec4855f90eb56f5df70d5dfc368ad37135473eb274d85647450b62d775a9b0aaf7f3f1cf9
-
SSDEEP
196608:xTziUNA8DIkd9lEnp0hofKRLoBF3McEuWMbCO5/jEpaeMQiXQqB4Wf0JNIvNtA0:x3igAgIk40hU24F8mWMbzEpOVXd4WfGQ
Malware Config
Extracted
nullmixer
http://6239caa95598d.com/
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/asdhjk/
Signatures
-
Nullmixer family
-
Socelars family
-
Socelars payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b79-82.dat family_socelars -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1944 powershell.exe -
resource yara_rule behavioral2/files/0x000a000000023b7c-47.dat aspack_v212_v242 behavioral2/files/0x000a000000023b7e-56.dat aspack_v212_v242 behavioral2/files/0x000a000000023b7b-51.dat aspack_v212_v242 behavioral2/files/0x000a000000023b6e-71.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 setup_install.exe -
Loads dropped DLL 6 IoCs
pid Process 4840 setup_install.exe 4840 setup_install.exe 4840 setup_install.exe 4840 setup_install.exe 4840 setup_install.exe 4840 setup_install.exe -
resource yara_rule behavioral2/files/0x0031000000023b75-78.dat vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 powershell.exe 1944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3580 wrote to memory of 4840 3580 20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe 83 PID 3580 wrote to memory of 4840 3580 20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe 83 PID 3580 wrote to memory of 4840 3580 20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe 83 PID 4840 wrote to memory of 4464 4840 setup_install.exe 86 PID 4840 wrote to memory of 4464 4840 setup_install.exe 86 PID 4840 wrote to memory of 4464 4840 setup_install.exe 86 PID 4840 wrote to memory of 1964 4840 setup_install.exe 87 PID 4840 wrote to memory of 1964 4840 setup_install.exe 87 PID 4840 wrote to memory of 1964 4840 setup_install.exe 87 PID 4840 wrote to memory of 4964 4840 setup_install.exe 88 PID 4840 wrote to memory of 4964 4840 setup_install.exe 88 PID 4840 wrote to memory of 4964 4840 setup_install.exe 88 PID 4840 wrote to memory of 3068 4840 setup_install.exe 89 PID 4840 wrote to memory of 3068 4840 setup_install.exe 89 PID 4840 wrote to memory of 3068 4840 setup_install.exe 89 PID 4840 wrote to memory of 4508 4840 setup_install.exe 90 PID 4840 wrote to memory of 4508 4840 setup_install.exe 90 PID 4840 wrote to memory of 4508 4840 setup_install.exe 90 PID 4840 wrote to memory of 4992 4840 setup_install.exe 91 PID 4840 wrote to memory of 4992 4840 setup_install.exe 91 PID 4840 wrote to memory of 4992 4840 setup_install.exe 91 PID 4840 wrote to memory of 3360 4840 setup_install.exe 92 PID 4840 wrote to memory of 3360 4840 setup_install.exe 92 PID 4840 wrote to memory of 3360 4840 setup_install.exe 92 PID 4840 wrote to memory of 2368 4840 setup_install.exe 93 PID 4840 wrote to memory of 2368 4840 setup_install.exe 93 PID 4840 wrote to memory of 2368 4840 setup_install.exe 93 PID 4840 wrote to memory of 1236 4840 setup_install.exe 94 PID 4840 wrote to memory of 1236 4840 setup_install.exe 94 PID 4840 wrote to memory of 1236 4840 setup_install.exe 94 PID 4840 wrote to memory of 1200 4840 setup_install.exe 95 PID 4840 wrote to memory of 1200 4840 setup_install.exe 95 PID 4840 wrote to memory of 1200 4840 setup_install.exe 95 PID 4840 wrote to memory of 3532 4840 setup_install.exe 96 PID 4840 wrote to memory of 3532 4840 setup_install.exe 96 PID 4840 wrote to memory of 3532 4840 setup_install.exe 96 PID 4840 wrote to memory of 2212 4840 setup_install.exe 97 PID 4840 wrote to memory of 2212 4840 setup_install.exe 97 PID 4840 wrote to memory of 2212 4840 setup_install.exe 97 PID 4840 wrote to memory of 1704 4840 setup_install.exe 98 PID 4840 wrote to memory of 1704 4840 setup_install.exe 98 PID 4840 wrote to memory of 1704 4840 setup_install.exe 98 PID 4840 wrote to memory of 2940 4840 setup_install.exe 99 PID 4840 wrote to memory of 2940 4840 setup_install.exe 99 PID 4840 wrote to memory of 2940 4840 setup_install.exe 99 PID 4464 wrote to memory of 1944 4464 cmd.exe 100 PID 4464 wrote to memory of 1944 4464 cmd.exe 100 PID 4464 wrote to memory of 1944 4464 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe"C:\Users\Admin\AppData\Local\Temp\20e1834814a6c07cbc793ea74c90e52c27cfb2769c6279a67f2d35c269ac6df4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\7zSCFD43D47\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCFD43D47\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caab24c05_Tue13d99ea87e13.exe3⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caabf419a_Tue1379612a69b.exe3⤵
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caaccb058_Tue13bd27d4.exe3⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caaf2d641_Tue13ad840f5cb1.exe3⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239cab1e6381_Tue13184f5267.exe3⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239cab382fbc_Tue13b309aefa.exe3⤵
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239cae7830c3_Tue13aff825.exe /mixtwo3⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239cae94e458_Tue1382c19a72cc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caec905b3_Tue1341ed2e4.exe3⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caeda0fad_Tue130c07fc556.exe3⤵
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caeecfdc8_Tue1392d723.exe3⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caef3f000_Tue13118fbd.exe3⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6239caefe43dd_Tue1347b894906.exe3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD598c3385d313ae6d4cf1f192830f6b555
SHA131c572430094e9adbf5b7647c3621b2e8dfa7fe8
SHA2564b2e2adafc390f535254a650a90e6a559fb3613a9f13ce648a024c078fcf40be
SHA512fdd0406ef1abee43877c2ab2be9879e7232e773f7dac48f38a883b14306907c82110c712065a290bafac3cc8b0f4c0a13694847ad60a50a2b87e6aed2fd73aff
-
Filesize
144KB
MD50d9b8092e6db0f9fa2bba3424775fe06
SHA1a081968f58e1499528aedc97bbdf11e978adaaed
SHA256e0351b54b4a2efe468c7522726574f17b13106425615f38353cdee198ac2fc87
SHA5128bdd180b7e8305c52c502e32e0d4e4894b4dc557e296ac71476358ef1f330396c237a16f23fc615b9a6be8db884daf11422bc95a3a4cabc0af1b6dd7d64c2b99
-
Filesize
376KB
MD581cf5e614873508b9ecba216112c276b
SHA1cb3115f68ffe4f428fc141f113dff477530f17fb
SHA256fae5984ff3106551dddee32196332ab4b9cabfe40476b80dd5aa8e1c9fcba413
SHA51248fba232d56c6acd0a3e97a64d096a6782000cc4d6d34f7d2379a54e6339bf373c14e95ba966a1fd8ecc05582cfad4e9dea6d61bb5492a570fdc1f637db7d29f
-
Filesize
1.5MB
MD5d016d60069c08706eb773505ea2bc27e
SHA1aed8973299138b620471a1621112e44cf9299c58
SHA256478620ce4405feee8cdf3123c486777b9cb6489819bae778a5673210549dd42a
SHA5126989ad7da2f0adc4854aa6c1efb2930b072d090fc8461b292cde61b1f6770108f5735dd19cd4364a1114f4d822631d83eadd4eb7be720f113c1a27fc55458d72
-
Filesize
228KB
MD5a3cc6bc603d53614778e0191730287ee
SHA1189f88117d955c4e18154aa71dda07fc6a98b79f
SHA25675965ccc41df8f409e3bfa674b6ae5c3bacdac81c5c13f195186b40f65aee3ef
SHA5120d973d7978fddb8d5a9165ec6822807917bb90142e53c864dab1a1570bdfc0fab3ba75df0ee54d4132e37a236907339578af7a1106d3acfa17ec7b2c3367f573
-
Filesize
2.4MB
MD54f859e08ce2bcb6f6a7ae2a1fe20ab35
SHA1ab51f935ffcbdcb0c5f070124a44b76563c8e107
SHA256d4ab529f3ece2e2770325224d7bab1afc1e32ea124df02236ce16f4562969420
SHA51240994913d17f7f912635e5cf7c2b5901b4da05c7c37d2526335e4fb3ccaed3264ea33ba08ab538a1c0ec7c1617577260a9e5638484b8dd09d49c1faca9491574
-
Filesize
377KB
MD586a313a997e2027468f10d0d2251ebc5
SHA16e8a4efb6eedd5ee417c4d12bbbee7702b55db32
SHA2568f89a9eb541ed9e92f15d0d809a9839e0d41188dd5c83e5169b18533c5a074b0
SHA512e24da4b3fcf04d802ac5ce21476043aaaa8e72d767224a8310e5d52c0eb70488368de0d4100eeb5e778e1a36f1024eb9e1d20131309329d7b0ecfecf6a9c5488
-
Filesize
3.5MB
MD5a8a11baaf47813906477a71f7f249af0
SHA171cb3b8facd11c8f31931dfab3ffd948062d62a0
SHA25681df0295d01aa80bc53c818d850b696ae6b6eeb95b68e6d6bcbed3e786d4fab1
SHA512870e6efe5d4bd14b4903ad7d84f7da0067a6e74b1c62868b1516ebe6a21d77e2feff29d67b521ea4cdcf06daafa25c0f22fbcc03c8d3d7b885e30807fb2d34aa
-
Filesize
227KB
MD51bd324456ba86ec8f86eab325ed69a4e
SHA12816326e3952785d9d77003fb5f421a7cd9b4bec
SHA2562810d00f32f6fa958946322ea52946db0b317166244688de65f7529958387a3f
SHA5128e1af1da4031a43aabeeb89c38c890bfbc6b0396de63446a9857aeeeabf59f30d2811395ec56dd41b8b06815c6fb06fe31f9527a8c27fa9dc23bbe9b1c99ec5e
-
Filesize
383KB
MD57a2ce17948b340a839dfff9a277e579b
SHA184d782630f25db5606e839bb798b6e66693670f6
SHA256c62c4510fdaa7d6a667efc0692f3b15300a556a7f372d19659d8c802f4425256
SHA5126d42a591c20616276eb2445af210e0cd277956aeddb87ca586d326f9edf32e54f52dfe38bf1b59583cb43ed21e12639988eb1d83456cdaf41917de0c96edc451
-
Filesize
1.6MB
MD579c79760259bd18332ca17a05dab283d
SHA1b9afed2134363447d014b85c37820c5a44f33722
SHA256e6eb127214bbef16c7372fbe85e1ba453f7aceee241398d2a8e0ec115c3625d3
SHA512a4270de42d09caa42280b1a7538dc4e0897f17421987927ac8b37fde7e44f77feb9ce1386ffd594fe6262ebb817c2df5a2c20a4adb4b0261eae5d0b6a007aa06
-
Filesize
1.4MB
MD5431c913c99510ed5a71d91655574bdc3
SHA12e0e85ff0d92def14312ac88388d845926c5edff
SHA25621a97c81bddd17ddc4f647eb4664cad4d9be88742f06dd79f115794cad1ad756
SHA512a62b1ed84f3ed78875a044cc179d425f5cc512a4e339b96db676fa0fb3b6dcd40fd5629c990bdae29e750d83a50dd09681f0a2685d78213e3ad01c09f39115ac
-
Filesize
1.8MB
MD5360e4efc56cb8a297f15523f88fe6377
SHA1fec916244218e7702f4fe69c5f8b5b81f0a6b287
SHA256cd223a1fe502507e806be32501cb8d98bf661ae2c02c6a0ae9be3d5c3ce4aa95
SHA512f175fc54d799bec556a63740d70a704f7a636a4ae6bd0fbb655553a02f4ef5bc825b50e095c4186dbdd3028536ad5ad85bb6026416e6c8f821484a3f0b18e7bb
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD5dfb18acbd58e0912f01f1839586242f8
SHA1ae303aff76e6b52ae18e876d9e06d801daa98c65
SHA2564ec58c88f60a7edb982a5a83de44075ebd27ca16968888e36df9d22e5eaf0770
SHA5122369713d2af2d8091f171d164afab49ce2845c476ec87d7bc71e29812fca7c0d66dbcc31ccb9d96b1640d8d10fcad99ae29e65248eb751da592c2e7d8b8ecd11
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82