Overview
overview
10Static
static
10Malware.2024.12.25.7z
windows7-x64
1Malware.2024.12.25.7z
windows10-2004-x64
12024-12-25...19.exe
windows7-x64
2024-12-25...19.exe
windows10-2004-x64
2024-12-25...8a.pdf
windows7-x64
32024-12-25...8a.pdf
windows10-2004-x64
32024-12-25...0d.pdf
windows7-x64
32024-12-25...0d.pdf
windows10-2004-x64
32024-12-25...96.exe
windows7-x64
72024-12-25...96.exe
windows10-2004-x64
72024-12-25...61.exe
windows7-x64
12024-12-25...61.exe
windows10-2004-x64
12024-12-25...03.pdf
windows7-x64
32024-12-25...03.pdf
windows10-2004-x64
32024-12-25...62.exe
windows7-x64
102024-12-25...62.exe
windows10-2004-x64
102024-12-25...25.exe
windows7-x64
12024-12-25...25.exe
windows10-2004-x64
12024-12-25...6b.exe
windows7-x64
102024-12-25...6b.exe
windows10-2004-x64
102024-12-25...ec.exe
windows7-x64
12024-12-25...ec.exe
windows10-2004-x64
32024-12-25...cc.exe
windows7-x64
12024-12-25...cc.exe
windows10-2004-x64
32024-12-25...3a.exe
windows7-x64
102024-12-25...3a.exe
windows10-2004-x64
102024-12-25...66.exe
windows7-x64
32024-12-25...66.exe
windows10-2004-x64
32024-12-25...97.exe
windows7-x64
102024-12-25...97.exe
windows10-2004-x64
102024-12-25...1d.pdf
windows7-x64
32024-12-25...1d.pdf
windows10-2004-x64
3Analysis
-
max time kernel
2s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Malware.2024.12.25.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Malware.2024.12.25.7z
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
2024-12-25/unknown-df6ecbdc8f043bbe3a4018a4fd3734c474761e1c7505fb0917df4fb808087e19.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
2024-12-25/unknown-df6ecbdc8f043bbe3a4018a4fd3734c474761e1c7505fb0917df4fb808087e19.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
2024-12-25/unknown-e0b170a4440b174bb3d6bd6c5abb8833cd7eae6eadc74d4176c8bb8a4b38ca8a.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2024-12-25/unknown-e0b170a4440b174bb3d6bd6c5abb8833cd7eae6eadc74d4176c8bb8a4b38ca8a.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
2024-12-25/unknown-e1e08ee8a9d8d42268b3537c74ec3f099dc05a1cf1fd91d3c1e54084957c570d.pdf
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
2024-12-25/unknown-e1e08ee8a9d8d42268b3537c74ec3f099dc05a1cf1fd91d3c1e54084957c570d.pdf
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
2024-12-25/unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
2024-12-25/unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
2024-12-25/unknown-e2c57dce7eb054b47a8f96e8be747b91ad1fce0bc0de597c9d41fce2623d9361.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
2024-12-25/unknown-e2c57dce7eb054b47a8f96e8be747b91ad1fce0bc0de597c9d41fce2623d9361.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
2024-12-25/unknown-e3dcabde5987c263aef8243cba944e442658bfcf1ad19ebbd7c78b89be0ab203.pdf
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
2024-12-25/unknown-e3dcabde5987c263aef8243cba944e442658bfcf1ad19ebbd7c78b89be0ab203.pdf
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
2024-12-25/unknown-e49324f54cdf00a226d1779157391c9c260ddb6a5179ece3276f326052b95962.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2024-12-25/unknown-e49324f54cdf00a226d1779157391c9c260ddb6a5179ece3276f326052b95962.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
2024-12-25/unknown-e4c4e59c66b650e0d696b6ec194d61637a688293cd5e23be9c630f7748c74125.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
2024-12-25/unknown-e4c4e59c66b650e0d696b6ec194d61637a688293cd5e23be9c630f7748c74125.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
2024-12-25/unknown-e668037208d053a72e197f6b156805776bf8bd8823c0b850d7c6302e22eb726b.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
2024-12-25/unknown-e668037208d053a72e197f6b156805776bf8bd8823c0b850d7c6302e22eb726b.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
2024-12-25/unknown-e8c053991c3618b30dde741da46435044fd5ae153f78c53f526f0de329fd43ec.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
2024-12-25/unknown-e8c053991c3618b30dde741da46435044fd5ae153f78c53f526f0de329fd43ec.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
2024-12-25/unknown-ea34039dbd854222e03748c548a5210e552bbfaa600ae0f24dfb55397a3136cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
2024-12-25/unknown-ea34039dbd854222e03748c548a5210e552bbfaa600ae0f24dfb55397a3136cc.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral25
Sample
2024-12-25/unknown-ebf18c1982c1ceec0f808a2e8a8b1fc11970a2483e2c92dc121d38292141ab3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
2024-12-25/unknown-ebf18c1982c1ceec0f808a2e8a8b1fc11970a2483e2c92dc121d38292141ab3a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
2024-12-25/unknown-ec6a36915e9f9d331e80881a2336503416fc441a599fec36e2601e6f27229b66.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
2024-12-25/unknown-ec6a36915e9f9d331e80881a2336503416fc441a599fec36e2601e6f27229b66.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral29
Sample
2024-12-25/unknown-ed34607d35c3e5e97ce126000df93ecdcc854d9e7bde1ee42e08b243df314697.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2024-12-25/unknown-ed34607d35c3e5e97ce126000df93ecdcc854d9e7bde1ee42e08b243df314697.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral31
Sample
2024-12-25/unknown-ed52a60eea60738501367935811e2f8a9ffe366ff9656cca8d4d9c78555d581d.pdf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
2024-12-25/unknown-ed52a60eea60738501367935811e2f8a9ffe366ff9656cca8d4d9c78555d581d.pdf
Resource
win10v2004-20250129-en
General
-
Target
2024-12-25/unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe
-
Size
380KB
-
MD5
f6801450c785d0873122146b2abac250
-
SHA1
00155ae2e2fb6221d54a02a6a37fba248361f991
-
SHA256
e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896
-
SHA512
1ede9e2a8ceb52b1a704453ef6c75075adf62dbbfc338d20d2e999fb06e95bf1ce4c1660dc6f6142e96f10dd6a7dabc5d69ab12c38fef683541455c49d33d064
-
SSDEEP
6144:PqQ1fKF0S3RN6GEFxim4SlcBjWMDibbn9o5v+Tk/M+b85BkAXP41ON2NMGEMh2Fa:PqMf4Ki59p/ML3FMhCQvjhZ3Rh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 towrite.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\having\towrite.exe unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language towrite.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 2804 towrite.exe 2804 towrite.exe 2804 towrite.exe 2804 towrite.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2804 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 30 PID 2776 wrote to memory of 2804 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 30 PID 2776 wrote to memory of 2804 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 30 PID 2776 wrote to memory of 2804 2776 unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-e1ffabc651f471b8d4141420d8e171310bc91a400462062ca96f6ac202a0a896.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\having\towrite.exe"C:\Program Files\having\towrite.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD575687a795131117411832900f2c81393
SHA154e482f85d1d281d751d145f3779cd18c1c8c6d4
SHA256aecc965c03d7274e98dcfd211cb38eccd6ca15fe26883b529a0333665d34118d
SHA5122d15a0e9a3aed38c0f19f98f55782e4224c734f2493dacabd1c7f8c07f1a61f90d4807e2ea991b7ae9a4c350830d029144c36b2c9ae298b165294971bc7ebfa0