Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 16:11
Behavioral task
behavioral1
Sample
1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe
Resource
win10v2004-20241007-en
General
-
Target
1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe
-
Size
482KB
-
MD5
e27c32776702de27eebe7c57d9f588c3
-
SHA1
53d540479ae70df2a8fa050c5a242a1025fbe597
-
SHA256
eecc7116c5730d44a829ee1e1d91cada1e9deb98122b358503e493aa5e60087a
-
SHA512
379d8b178d0642c679ca619845d19bd5ff340f7bb5dd2c279278855c953f3547776d31b826ae0bf0b4527baaaceb61bbefb297890a5c173d8524e19bcf63091d
-
SSDEEP
12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQwS:jak/mBXTV/R0nEF76gFZH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2692 2396 1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe 32 PID 2396 wrote to memory of 2692 2396 1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe 32 PID 2396 wrote to memory of 2692 2396 1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe 32 PID 2396 wrote to memory of 2692 2396 1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\1737648608d6e5c4bff7f57356e0f8f21179cf1963e8689a7a7b90f7e9eee58abb2e0511df554.dat-decoded.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qhlzybrvkxmfpjihmhzaljwzovajfwrlni.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD591823113fc0439d52600c76376419001
SHA1e104d9a4936217820c1a2b6c3448dde603b3841c
SHA256bbbcab5a14b54e47641afe7c4b31c009c293a168535731a80ac900fe35c3723a
SHA5120e75e02f908a0a2220f794ca572db5a2a1d7dab1a1cde1c38ada5e2a6750ae68b29e2f8924559ebe0864c8be4073a9fc6e240c4f347989e19db0817dedd0c48d
-
Filesize
828B
MD5d3f6752db373b7e25bf6d4ed679c1cc5
SHA1111c25fb81f6726e76470643db1adf46c048b9dc
SHA256c5d0ca6c848e8ffb090f70b40a14d1841e087175077fdac6d7e8b9d4d6989a60
SHA5125cccd41a55ae1df0c576ee7016f128cb6b1049148cc6de2eb7220330da43a631410568215b67f3d10de23b8dec7358f82951704e1056083fbd049823f1b144fb