Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 03:23
Behavioral task
behavioral1
Sample
42165967c19a9d6de801808f55328c10N.exe
Resource
win7-20240705-en
General
-
Target
42165967c19a9d6de801808f55328c10N.exe
-
Size
59KB
-
MD5
42165967c19a9d6de801808f55328c10
-
SHA1
653ea9f1c6dda7136fdee16657bfd55093a181ab
-
SHA256
9a27ee5353fac278211c77803f634180e682d1ca899ed4fee2655212e3debf22
-
SHA512
236cb418f09da2315fbe10a1e23bcd6613d399c708c94b0b395e1d5f0471d2f79abd72f3a3be55d804ccd2c5662b090e27f7cb5bf46cdf5431424cdf29266b7a
-
SSDEEP
1536:2rs48ho0MOof8S+w8rUau5/qIauG6dDyiJC3T6N:k18G+d/w8K/l1BC3e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 42165967c19a9d6de801808f55328c10N.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 42165967c19a9d6de801808f55328c10N.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 42165967c19a9d6de801808f55328c10N.exe -
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x00090000000120f9-10.dat upx behavioral1/memory/2076-12-0x00000000001E0000-0x000000000021D000-memory.dmp upx behavioral1/memory/2340-17-0x0000000000400000-0x000000000043D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42165967c19a9d6de801808f55328c10N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2076 42165967c19a9d6de801808f55328c10N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2076 42165967c19a9d6de801808f55328c10N.exe 2340 42165967c19a9d6de801808f55328c10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2340 2076 42165967c19a9d6de801808f55328c10N.exe 31 PID 2076 wrote to memory of 2340 2076 42165967c19a9d6de801808f55328c10N.exe 31 PID 2076 wrote to memory of 2340 2076 42165967c19a9d6de801808f55328c10N.exe 31 PID 2076 wrote to memory of 2340 2076 42165967c19a9d6de801808f55328c10N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exe"C:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exeC:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5473afebd0dfcfc4b3bad03a30eb3d665
SHA1886fed257f19cefe78919d687d8d881cb3d354ce
SHA2567027be4a023a2ff4d507e2bf1305e065b517e407adef53cd9513bb03701d1e4a
SHA512c2eddefc1519041266545d2e272e6af68e1e87b12d08398701debea07a5bc5ad319e9791333499245cc0c980915db014a8247bf66f58a5e55c3e81e98ec421f1