Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 03:23
Behavioral task
behavioral1
Sample
42165967c19a9d6de801808f55328c10N.exe
Resource
win7-20240705-en
General
-
Target
42165967c19a9d6de801808f55328c10N.exe
-
Size
59KB
-
MD5
42165967c19a9d6de801808f55328c10
-
SHA1
653ea9f1c6dda7136fdee16657bfd55093a181ab
-
SHA256
9a27ee5353fac278211c77803f634180e682d1ca899ed4fee2655212e3debf22
-
SHA512
236cb418f09da2315fbe10a1e23bcd6613d399c708c94b0b395e1d5f0471d2f79abd72f3a3be55d804ccd2c5662b090e27f7cb5bf46cdf5431424cdf29266b7a
-
SSDEEP
1536:2rs48ho0MOof8S+w8rUau5/qIauG6dDyiJC3T6N:k18G+d/w8K/l1BC3e
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1276 42165967c19a9d6de801808f55328c10N.exe -
Executes dropped EXE 1 IoCs
pid Process 1276 42165967c19a9d6de801808f55328c10N.exe -
resource yara_rule behavioral2/memory/440-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x000800000002349b-11.dat upx behavioral2/memory/1276-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42165967c19a9d6de801808f55328c10N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 440 42165967c19a9d6de801808f55328c10N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 440 42165967c19a9d6de801808f55328c10N.exe 1276 42165967c19a9d6de801808f55328c10N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 440 wrote to memory of 1276 440 42165967c19a9d6de801808f55328c10N.exe 85 PID 440 wrote to memory of 1276 440 42165967c19a9d6de801808f55328c10N.exe 85 PID 440 wrote to memory of 1276 440 42165967c19a9d6de801808f55328c10N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exe"C:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exeC:\Users\Admin\AppData\Local\Temp\42165967c19a9d6de801808f55328c10N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52d9eb3d22891ef34d5a039cd01430593
SHA18fbf5b4cc5ac6cacef858e0eec18ead522b356a2
SHA256732cf268f08939297384bb86ec48e1062db1e2c5025be82337050786db635df1
SHA5129cf7f651ca364d723a6998222d5ddf8bfa3099175f84c266eecb112f12c694e29e845451bdc93430dab037f93543034ebf54b3928225fbc69c6478cc96adb9cb