Analysis
-
max time kernel
1s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe
Resource
win10v2004-20250314-en
General
-
Target
d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe
-
Size
372KB
-
MD5
47b179f387ffd4a63dbc7c4ba9abd3bb
-
SHA1
5b1f786079d20b4d3af833fe57a63fb7446f4c6e
-
SHA256
d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e
-
SHA512
ae648e6cc9545a1390aca86c05bd247b1b21d8565f7ea4c5ea385c8727518c368f4a880a3566ce277bf4e84b682a6e7502cb58fc9bf36689d44e1b7d8552b224
-
SSDEEP
6144:t8dgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiWO:t2qQx+H2i+8LBNbdypazCXYw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 904 hab.exe 2216 hab.exe -
Loads dropped DLL 3 IoCs
pid Process 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 904 hab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2412 set thread context of 1724 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 30 PID 904 set thread context of 2216 904 hab.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe File opened for modification C:\Windows\win.ini d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 904 hab.exe 904 hab.exe 2216 hab.exe 2216 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 904 hab.exe 904 hab.exe 2216 hab.exe 2216 hab.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 904 hab.exe 2216 hab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1724 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 30 PID 2412 wrote to memory of 1724 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 30 PID 2412 wrote to memory of 1724 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 30 PID 2412 wrote to memory of 1724 2412 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 30 PID 1724 wrote to memory of 904 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 31 PID 1724 wrote to memory of 904 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 31 PID 1724 wrote to memory of 904 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 31 PID 1724 wrote to memory of 904 1724 d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe 31 PID 904 wrote to memory of 2216 904 hab.exe 32 PID 904 wrote to memory of 2216 904 hab.exe 32 PID 904 wrote to memory of 2216 904 hab.exe 32 PID 904 wrote to memory of 2216 904 hab.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe"C:\Users\Admin\AppData\Local\Temp\d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe"C:\Users\Admin\AppData\Local\Temp\d7c4dc87e9f307277b701a7e748be1509f912d8b94505cf8c1f2d9ab25525f7e.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
372KB
MD56a632a13dff6694e0fc57a24a9b5883d
SHA12ac4124cf2fcd3383c4fee49f5dd03151df9df02
SHA256c788cb72d89bdf452a2042626ee332ba77478996d56aefa0525bdb8554d13127
SHA5129cdcbe789050a64f9b822d07770cea0e4faf9c2f56826fa7bae0eaa570d9f7b20c6924599abee9cd888587f79a01e2e4872bb7d1a0b42b2da33a536a7b9bff48