Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/02/2025, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
pacman.exe
Resource
win7-20241010-en
General
-
Target
pacman.exe
-
Size
17.4MB
-
MD5
6b7c47f469f6d6da5f29cd4abf021af3
-
SHA1
2b802b1081242beae884ed280c6f243576bce589
-
SHA256
e0320dd07664a62a6b8d85c68df98aa3a674428a8c85e6f75410a1dbfe66ca2a
-
SHA512
fdb8f1b7748b3d0eb07e11c1811134f8c865a335147f079b2bc73bd01411fb44f9940af44c877d4fe72a333ac9801c542e7ab3459cf72bf50601046615ae2bcf
-
SSDEEP
393216:qzzj4URW5zzG+1Zvnd51xKvjLSAILzBCEIvhUq:gnkfPTKv6zBCtWq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pacman.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2928 2004 pacman.exe 30 PID 2004 wrote to memory of 2928 2004 pacman.exe 30 PID 2004 wrote to memory of 2928 2004 pacman.exe 30 PID 2004 wrote to memory of 2928 2004 pacman.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\pacman.exe"C:\Users\Admin\AppData\Local\Temp\pacman.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\R17-record-pacman.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5431d239c71734aea3487d3fceb9b5346
SHA133fd8d7846c7e4f9d130155a021dcb3899ad3ce5
SHA2564b14f4a0dea3b70bc6e23070afc3fc0a433a2512699d74c46ba0049ecc2aeb85
SHA5120530cc09a07c531ee4b8076cc7c25d19371c12af431196b0efafd7b028ea372e4d29b11bdead5cd46f1a184fd8170df56312c20adb9fabe46762c9b0db344ddf