Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 12:23
Static task
static1
Behavioral task
behavioral1
Sample
d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe
Resource
win7-20240903-en
General
-
Target
d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe
-
Size
2.5MB
-
MD5
3c183fbdc12ad0c81f49430831397ee1
-
SHA1
1a156eca31ac583bf1b94fdf3e5b13e12132fd8f
-
SHA256
d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf
-
SHA512
9a967699b90151129c50b0b9ff2344c4f3c84bda805fbfdfe15c6c44ea814c40ea0bfe39b43f8cfc1c7c5937534ac63e9744e78f12bed60b31147b6124a263ce
-
SSDEEP
49152:eQFprsWGIHAxqOx6V8KG0b1yMGgxqOx6V8KG0b1yMG:eKprsWTFOsKsnGFOsKsnG
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe OyNgUtIUBf.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.exe OyNgUtIUBf.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 OyNgUtIUBf.exe 344 NaReDACbPR.exe -
Loads dropped DLL 3 IoCs
pid Process 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 1836 wrote to memory of 2800 1836 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 31 PID 2800 wrote to memory of 2700 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 32 PID 2800 wrote to memory of 2700 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 32 PID 2800 wrote to memory of 2700 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 32 PID 2800 wrote to memory of 2700 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 32 PID 2800 wrote to memory of 344 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 33 PID 2800 wrote to memory of 344 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 33 PID 2800 wrote to memory of 344 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 33 PID 2800 wrote to memory of 344 2800 d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe"C:\Users\Admin\AppData\Local\Temp\d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe"C:\Users\Admin\AppData\Local\Temp\d422626abd6f10fabbf6053e49c273129587843f49802b7f2123fa3907488fbf.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Roaming\OyNgUtIUBf.exe"C:\Users\Admin\AppData\Roaming\OyNgUtIUBf.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\NaReDACbPR.exe"C:\Users\Admin\AppData\Roaming\NaReDACbPR.exe"3⤵
- Executes dropped EXE
PID:344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
898KB
MD50f4f19c69e1c39ac07570d86bc8357da
SHA185c6b48dd81b9eb071fed00d76f8351b517974e3
SHA25689b62603775904cb0f7acc357df34953a4baab90deef47e8a3bc2ffc49808927
SHA512c19b08b56c3f89c436726505dc6dd61bee4d1e18f5eedf2b1972db5f8ec01db0610ddd00c5ae55dd7b9861afb9d4a86293808a10c47d92ebc3a173ca17200b62
-
Filesize
11KB
MD55afb8ce4dd3923219bd69bd7b5168d91
SHA1e06283294510284af9082eb67d368e6d88d9e232
SHA256f727bba8d917fa3f129d71745e0741a8511f940b1a6817ff5130aa2f3ae85c79
SHA5128135efb34c768a9c292b54bc25845dd9b388e98f9f0b67918fbf5887c8e1d3da81bb84e044eebdf0868c40a685bd157daafb4789b373dea3e273c5275ebd0740