Analysis
-
max time kernel
84s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 19:48
Static task
static1
Behavioral task
behavioral1
Sample
a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe
Resource
win10v2004-20241007-en
General
-
Target
a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe
-
Size
140KB
-
MD5
9bcbd5ec17c2189fc213f708f18244a0
-
SHA1
f36f70b25b439d1914121151650f2bc0d2f60be3
-
SHA256
a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54
-
SHA512
3a3694c82aedb1eead9dc616505dc1b0d7f150c50c90b6a0cdc0a23d94b60f956a86a62b4af569dffa4047fb37505a221aa313698613d65ec2de4a4f5419aa0c
-
SSDEEP
3072:xPd4n/M+WLcilrpgGH/GwY87mVmIXhIHVSYK:xP6/M+WLckOBhVmIYPK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 wn2ra4ohzdr.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2044 2488 a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe 31 PID 2488 wrote to memory of 2044 2488 a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe 31 PID 2488 wrote to memory of 2044 2488 a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe 31 PID 2488 wrote to memory of 2044 2488 a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe 31 PID 2044 wrote to memory of 2812 2044 wn2ra4ohzdr.exe 32 PID 2044 wrote to memory of 2812 2044 wn2ra4ohzdr.exe 32 PID 2044 wrote to memory of 2812 2044 wn2ra4ohzdr.exe 32 PID 2044 wrote to memory of 2812 2044 wn2ra4ohzdr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe"C:\Users\Admin\AppData\Local\Temp\a77c3a72069bfe560fd89534dba1be9fcc61ce1a607a02b8874bac9f734acf54.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5edf4ad3ea685542ac5eb85d2f9c51615
SHA149e3b70cdc4a32e1f474718a552cbea048f9c7f3
SHA256df3d33d83352a287b6f0e274e1b791484bbd7d8aa3d2322275c94d7147d5e7f8
SHA512e7940f1fcb520a2387dd3d0a89de305bc1736de170d224ff2fb0a2b0a03fe27ab2679a243335f2aea68e52a0cd573c150e3535c6c8320fa098e02746781d6165