Analysis
-
max time kernel
98s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
d5eb5374e10763860ef28d6b7ed9f3a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d5eb5374e10763860ef28d6b7ed9f3a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
d5eb5374e10763860ef28d6b7ed9f3a0N.exe
-
Size
48KB
-
MD5
d5eb5374e10763860ef28d6b7ed9f3a0
-
SHA1
42407c09a9da43ae9a56ae69dd79c4376f026595
-
SHA256
924b358708b6b0585b364b45f6b06766e0a1745746605e16471e28ae6e1a970a
-
SHA512
31ab391a181062b05575149424500be5597ce3d76422c56a1bf76a24a270dc8c99420e12bbea90bd8f2d5cd8a5801adb21772370aeeaddf9f15f6f48469d52f0
-
SSDEEP
768:w0VhtAfwHimao51vD6VHypXI0LdWfQqzNWNLP9T0BBAlLlSyuis5:w0hAW1iqdWNzI5Pd4CSyuis5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2988 NQTC.NQT -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5eb5374e10763860ef28d6b7ed9f3a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NQTC.NQT -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2988 1272 d5eb5374e10763860ef28d6b7ed9f3a0N.exe 85 PID 1272 wrote to memory of 2988 1272 d5eb5374e10763860ef28d6b7ed9f3a0N.exe 85 PID 1272 wrote to memory of 2988 1272 d5eb5374e10763860ef28d6b7ed9f3a0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5eb5374e10763860ef28d6b7ed9f3a0N.exe"C:\Users\Admin\AppData\Local\Temp\d5eb5374e10763860ef28d6b7ed9f3a0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\NQTC.NQT"C:\Users\Admin\AppData\Local\Temp\NQTC.NQT"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5c504c4b9ac0ff81a89dbadde9b0784e9
SHA145a76a145009da379792fea33cc74986a88349fc
SHA256c16a001abff62eca4accf42fbd90a63d25cad49a24c143999db908a65538c017
SHA512e32f9a07cca5a24bf45a936317d521548890502553d144bf90a85b796d005efb568f025e26b194846c81a8e1b71c8bbe1f968d1b6ace846666f62be72b96b9f9