Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe
Resource
win7-20240708-en
General
-
Target
a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe
-
Size
416KB
-
MD5
8a7e3af869e419b7120aad8086528180
-
SHA1
43b86e2dbc462e3a0d4f9e21f9accd504ea65650
-
SHA256
a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313c
-
SHA512
c46436ee506a6ee98350a543d6fa6c98bfb7e3910f16a85bfe102f21aacd17d1184372a958297d47baedb39a84ace6e562518123f6d414c212cbbfea08665eb1
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUM:ITNYrnE3bm/CiejewY5vR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 ximo2ubzn1i.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2940 2160 a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe 30 PID 2160 wrote to memory of 2940 2160 a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe 30 PID 2160 wrote to memory of 2940 2160 a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe 30 PID 2160 wrote to memory of 2940 2160 a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe 30 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31 PID 2940 wrote to memory of 2904 2940 ximo2ubzn1i.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe"C:\Users\Admin\AppData\Local\Temp\a4103128ccddadfc620eaf9d6c7454c590ef0cded61e46ae2bcdfd8ffc2e313cN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD50b128f4e128f1cddd1609fec8cd915a2
SHA1e53c1be036935dbf4660d54be111839f50be67c8
SHA256106ffb0f6335764da744b5706ed6f6899f0e8c206bb3d88b390cd91c810f14be
SHA5122734790cfd94e53d23119104053ca19de400fe5f902286a55e3705c9bed19d8a442058ceaed1a76429b9c18620794a67cb84fe248b4a61fc3a1a5f1b24f36e68