Analysis
-
max time kernel
35s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe
Resource
win7-20240903-en
General
-
Target
ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe
-
Size
255KB
-
MD5
d494a9f8938f4c23ec8d83d60376011a
-
SHA1
4e5ba0dec506040ace872a37002783c1d0b4216c
-
SHA256
ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a
-
SHA512
beb93e6b994429d477db26e9201fa6ee6b59f05bed7ad337dc0771731430ba9a758b410483b8a526932bca4393da0aa3068a224f50fe203dd87002010116a968
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQSp:EeGUA5YZazpXUmZhdp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2852 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 2852 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2272 wrote to memory of 2852 2272 ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe 31 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2660 2852 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe"C:\Users\Admin\AppData\Local\Temp\ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e43e34252b42da04759d240b65985676
SHA10ef22f36610fef21d45f90ad082379733ef05327
SHA2567023f8dadfbec5317192f382f69be2bfaa4341c40b924dfe2fc234c6c3b4476f
SHA512cea189eca27bbcc8608e4f43f651d193af7ebf36b5b4ab32f6ebeb3e67db0a86b5b259476191cb50e3cf4631669eaca627f7e40ea9a97ea13574e16b33f6a37f