Analysis
-
max time kernel
3s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe
Resource
win10v2004-20250314-en
General
-
Target
66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe
-
Size
372KB
-
MD5
f11ebe1eaa375bea0bf50a58d30f75b5
-
SHA1
e51d3e180b5620eed10e81fba98e3a8ce9be1476
-
SHA256
66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520
-
SHA512
d670320b4d7999bb041b8b412ad84541c1233a2dc6f876de0f6a9230717fcf84edf27d3bdc1e316d9b7c24610677b4a7edf82517d039192415717efcc9303f1a
-
SSDEEP
6144:tmdgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhieK:tsqQx+H2i+8LBNbdypazCXYI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2820 hab.exe 2992 hab.exe -
Loads dropped DLL 3 IoCs
pid Process 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2820 hab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 2552 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 29 PID 2820 set thread context of 2992 2820 hab.exe 31 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe File opened for modification C:\Windows\win.ini 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2820 hab.exe 2820 hab.exe 2992 hab.exe 2992 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2820 hab.exe 2820 hab.exe 2992 hab.exe 2992 hab.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 2820 hab.exe 2992 hab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2552 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 29 PID 2380 wrote to memory of 2552 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 29 PID 2380 wrote to memory of 2552 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 29 PID 2380 wrote to memory of 2552 2380 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 29 PID 2552 wrote to memory of 2820 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 30 PID 2552 wrote to memory of 2820 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 30 PID 2552 wrote to memory of 2820 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 30 PID 2552 wrote to memory of 2820 2552 66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe 30 PID 2820 wrote to memory of 2992 2820 hab.exe 31 PID 2820 wrote to memory of 2992 2820 hab.exe 31 PID 2820 wrote to memory of 2992 2820 hab.exe 31 PID 2820 wrote to memory of 2992 2820 hab.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe"C:\Users\Admin\AppData\Local\Temp\66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe"C:\Users\Admin\AppData\Local\Temp\66878712273890ab91aa91cc87a7ca370ff4d4f03035f8de78e35c051d58a520.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5801737e80570afe7c1e001d36e390468
SHA165ec08daaa61c0604184cfdf58a491c5177022d8
SHA2566badc1326ab101ee60ea7c7496b995b826375e8442f74d049d30d7e4f9cf5a29
SHA512ba1b48069208fee9cb4d85fe588ec9d5e19ceffbc0a2b92899fefa7c21bb8ebf38e126d61da85ba6f18e496d499faf5b7b45f4263d5d94e958fb693dc10546ae
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31