Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 12:58
Static task
static1
Behavioral task
behavioral1
Sample
8WL@O7~XlRY.zip
Resource
win7-20241023-en
General
-
Target
8WL@O7~XlRY.zip
-
Size
1.3MB
-
MD5
f2a2deb66220dec15632f27d91bbdb16
-
SHA1
8edd492215d95f2df5088a2626fb87664697790a
-
SHA256
de94a3e312de49229cfd088163fb38610b286c7399eb5dc15410e46a25fafb2e
-
SHA512
ee611e2b151627adb6ce2caa5a29091a0d8e202099de56fa99fdea022a3ca03b26b5da2747a340198f81d12f57a00b58e5c7169d1ee29a38fd84e4a51fc51fd5
-
SSDEEP
24576:mX8eLw0r9awIWR9DkplieZ2NOpo88EyV3zM1mOBACY+W8jBgGGOiFTQobTJq:m9r9FImB9fOpo443zMDBo+9WGziF0obw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 Bootstrapper.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2844 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 308 7zFM.exe 2788 Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 308 7zFM.exe Token: 35 308 7zFM.exe Token: SeSecurityPrivilege 308 7zFM.exe Token: SeSecurityPrivilege 308 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 308 7zFM.exe 308 7zFM.exe 2844 NOTEPAD.EXE 308 7zFM.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 308 wrote to memory of 2844 308 7zFM.exe 30 PID 308 wrote to memory of 2844 308 7zFM.exe 30 PID 308 wrote to memory of 2844 308 7zFM.exe 30 PID 308 wrote to memory of 2788 308 7zFM.exe 31 PID 308 wrote to memory of 2788 308 7zFM.exe 31 PID 308 wrote to memory of 2788 308 7zFM.exe 31 PID 308 wrote to memory of 2788 308 7zFM.exe 31
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\8WL@O7~XlRY.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO431ECCA6\README.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\7zO431B4496\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO431B4496\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD58ad45fd72a78fb731a2ba19df0149cae
SHA1a0614e43edaa61ee50f750c95e5a9361ee76fc3d
SHA2565612aad58f43e1beb974deda0f1f678e1a4b5f74dbb07a94db5b9558f2814426
SHA512f94c257a90526a86fb93f0d2fbae87fa4326a3c35aac62c0cc46ee2b2b5f94faefd8d6535594e2d0e317b4c3e4ee468bf3b2b0876ee59440f7a2270d45adacea
-
Filesize
124B
MD53b4bb14e17a60137e3e93c7adac41bcb
SHA1de09ed28df13d9325e816d0c656582a929077876
SHA256bde691c014e6a2527d5ef783d065edf14bcfe83b20c1ff97c22d280633b5287e
SHA512ec76f39b6ab4c6f822a1777c78212d659d86760458da9f050fba48bef12cba054573f25fc96278b49cdb163bed41a157123c01d3897226584cd1b57a653dfb50