Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:41
Static task
static1
Behavioral task
behavioral1
Sample
4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe
Resource
win7-20241010-en
General
-
Target
4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe
-
Size
279KB
-
MD5
55972f7d15273da7566f4f2b1a64200d
-
SHA1
3747c59123adf4f9cb1225fb2180a77166b13437
-
SHA256
4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6
-
SHA512
3b3bd465d8a98205a788ec298a5a3d1c0bb3665b10200534d2e2490ac5a9d0709b0a574cc7afea4a04cbdac111f92f18f68cc0bac42381a251652acd90ced25d
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66fQ:boSeGUA5YZazpXUmZhZ6o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 2700 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 1824 wrote to memory of 2700 1824 4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe 30 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32 PID 2700 wrote to memory of 2244 2700 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe"C:\Users\Admin\AppData\Local\Temp\4ff402a5d41e20740c3bca70bd0cdefa0a02e3e2c59772df79d6c773ab6cd2d6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5ceb8945303fb3a723c167d781dcd285c
SHA163e85d7c6cfe8c4b3f73c114370fc6be33c78010
SHA25657272341896ffcf3fa2fbf9aac6ca1481fb190eb622bd4a15d2edf409a1c2042
SHA5123d434f01127ca2cace3a82f97f8448f95e45c5267e1823b31801f5184d7ca6763194bf9bb7bcf8b6f02e02fa13cb74ac93b1d805507a70c6d7092cfa09235374