Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe
Resource
win10v2004-20250313-en
General
-
Target
3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe
-
Size
372KB
-
MD5
0e51ba9445f6978daad3465cd383b3c7
-
SHA1
da42572d8384c67e0bd67ec37430b9ca77040e93
-
SHA256
3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a
-
SHA512
38d5cd0bed279a49a60a1deb282f181d3ac8f67afb4af15358b6648c8a47cde3430b7bdd3be500703a2054be60ab2ad0bb2a1771bd36d59eccec81f14d179db5
-
SSDEEP
6144:tZdgUkQx+HXGidCzj8LBb8Rw5Jdypyf6aCXYfhiiO:t7qQx+H2i+8LBNbdypazCXY0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2892 hab.exe 2880 hab.exe -
Loads dropped DLL 3 IoCs
pid Process 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 2892 hab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2440 set thread context of 3016 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 30 PID 2892 set thread context of 2880 2892 hab.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\win.ini hab.exe File opened for modification C:\Windows\win.ini 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe File opened for modification C:\Windows\win.ini 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe File opened for modification C:\Windows\win.ini hab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hab.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 2892 hab.exe 2892 hab.exe 2880 hab.exe 2880 hab.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 2892 hab.exe 2892 hab.exe 2880 hab.exe 2880 hab.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 2892 hab.exe 2880 hab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3016 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 30 PID 2440 wrote to memory of 3016 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 30 PID 2440 wrote to memory of 3016 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 30 PID 2440 wrote to memory of 3016 2440 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 30 PID 3016 wrote to memory of 2892 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 31 PID 3016 wrote to memory of 2892 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 31 PID 3016 wrote to memory of 2892 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 31 PID 3016 wrote to memory of 2892 3016 3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe 31 PID 2892 wrote to memory of 2880 2892 hab.exe 32 PID 2892 wrote to memory of 2880 2892 hab.exe 32 PID 2892 wrote to memory of 2880 2892 hab.exe 32 PID 2892 wrote to memory of 2880 2892 hab.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe"C:\Users\Admin\AppData\Local\Temp\3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe"C:\Users\Admin\AppData\Local\Temp\3b42b77b0bca33235ea576f37dc3cabd7a2b2bd501089380ffa15098293eab8a.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\hab.exe"C:\Users\Admin\AppData\Local\Temp\hab.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
372KB
MD59afec1c9d3bce1d8f7c43023e08da18a
SHA126e3715ee4c2cc2784888a26acd621e63523a4be
SHA256e878ab379e756346e131a20873f25a2142413ee97adcda8d15a05da2a02e1be6
SHA5126e55a8b902cda2579e774ec30b616adf281d537b2d614225d756055c820ea52c4c1cc0fa389a2f20f9967279cce478dd26642dcdb7b71c6e6c813ee1cf7b5958