Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 13:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
TT.2.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
300 seconds
Behavioral task
behavioral2
Sample
TT.2.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
16 signatures
300 seconds
General
-
Target
TT.2.exe
-
Size
654KB
-
MD5
510fd19d92d3b0b7bf15c25136f4f4a8
-
SHA1
d72a9835b6cde04c97a6f36f0f440086a950725b
-
SHA256
29bf23ea98222665327d48b87f3203f0158fb63e04deba0a803044b19faa69ce
-
SHA512
2009ba6f36e2c1b06acb4786045147c0e526d3cac3b4e410121c5b27977644a6d6d8b7a725b7dd91b216fa868891d258011c5e5c6fcc54c0a94b941f07bab7d3
-
SSDEEP
12288:JbRKjP7ne32KZc0IhELRVH6JRvKX2ZFEKy2THq2v:TKjP7efiIRkJIWFpdv
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe Powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 3060 2564 TT.2.exe 32 -
pid Process 2352 Powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TT.2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2352 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 Powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2352 2564 TT.2.exe 30 PID 2564 wrote to memory of 2352 2564 TT.2.exe 30 PID 2564 wrote to memory of 2352 2564 TT.2.exe 30 PID 2564 wrote to memory of 2352 2564 TT.2.exe 30 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32 PID 2564 wrote to memory of 3060 2564 TT.2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT.2.exe"C:\Users\Admin\AppData\Local\Temp\TT.2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\TT.2.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'2⤵
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\TT.2.exe"C:\Users\Admin\AppData\Local\Temp\TT.2.exe"2⤵PID:3060
-