Resubmissions

13/01/2025, 04:24 UTC

250113-e1qgeaykcj 10

12/01/2025, 18:25 UTC

250112-w2kqzswlap 10

Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2025, 18:25 UTC

General

  • Target

    22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe

  • Size

    2.9MB

  • MD5

    b301fcd837bc76a763b37dd59ae8c266

  • SHA1

    2e6610726c9419df3a4d32a1bad0d5d6e3582c9d

  • SHA256

    22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994

  • SHA512

    2a639f1afec3848a10a91887e5f9009783bdefd0f87b7a7a55a9f4ddc261a61b29cf888ea562946b298cb423ccab748c3ace92fa961ef32926c00c1f21c907df

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHr:7v97AXmw4gxeOw46fUbNecCCFbNecE

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe
    "C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
      2⤵
      • Drops startup file
      • System Location Discovery: System Language Discovery
      PID:3640
    • C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe
      C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe
        C:\Users\Admin\AppData\Local\Temp\22d5f44e696e41317081c500a2ee9aecc18e0093d05e3f99e21e2ccb7ca4f994.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2532
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        3⤵
          PID:3912

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      58.55.71.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      58.55.71.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      135.204.76.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      135.204.76.23.in-addr.arpa
      IN PTR
      Response
      135.204.76.23.in-addr.arpa
      IN PTR
      a23-76-204-135deploystaticakamaitechnologiescom
    • flag-us
      DNS
      136.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      136.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      212.20.149.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      212.20.149.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      171.39.242.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      171.39.242.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      58.55.71.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      58.55.71.13.in-addr.arpa

    • 8.8.8.8:53
      135.204.76.23.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      135.204.76.23.in-addr.arpa

    • 8.8.8.8:53
      136.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      136.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      212.20.149.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      212.20.149.52.in-addr.arpa

    • 8.8.8.8:53
      171.39.242.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      171.39.242.20.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2532-16-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2532-34-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2532-18-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3208-11-0x00000000004E7000-0x0000000000513000-memory.dmp

      Filesize

      176KB

    • memory/3208-1-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3208-6-0x00000000004E7000-0x0000000000513000-memory.dmp

      Filesize

      176KB

    • memory/3208-3-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3208-5-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3208-10-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3208-9-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3208-2-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3208-12-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3208-4-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3208-7-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3208-8-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3208-27-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3208-30-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3912-25-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/3912-24-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/3912-21-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.