Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
62357850a84f7ab4976be67dd787e9e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62357850a84f7ab4976be67dd787e9e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
62357850a84f7ab4976be67dd787e9e0N.exe
-
Size
8.7MB
-
MD5
62357850a84f7ab4976be67dd787e9e0
-
SHA1
d1879c24d84197d3b20cccae9277ae94aba98b26
-
SHA256
8dc7abdd4f1576cd549697f43cca9d579e1a69478bb24d4d25f2f992df80626b
-
SHA512
1a1a8886f9cc2351c903a07ea96367a825ee3a559f46b09cf75c0a33383268377853f0826318f8c230dc6b78e9e6698c622c8558e1feb0b82fe88c5c99aa1532
-
SSDEEP
196608:HPjgxUVgTMUqraAXz20gxDzbN4lAyL+eFfOiztS9JUN:vyZWaiiDLyxd5M9e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 62357850a84f7ab4976be67dd787e9e0N.tmp -
Loads dropped DLL 12 IoCs
pid Process 3048 62357850a84f7ab4976be67dd787e9e0N.exe 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62357850a84f7ab4976be67dd787e9e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62357850a84f7ab4976be67dd787e9e0N.tmp -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 62357850a84f7ab4976be67dd787e9e0N.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 62357850a84f7ab4976be67dd787e9e0N.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp 2508 62357850a84f7ab4976be67dd787e9e0N.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31 PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31 PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31 PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31 PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31 PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31 PID 3048 wrote to memory of 2508 3048 62357850a84f7ab4976be67dd787e9e0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\62357850a84f7ab4976be67dd787e9e0N.exe"C:\Users\Admin\AppData\Local\Temp\62357850a84f7ab4976be67dd787e9e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\is-TMNPC.tmp\62357850a84f7ab4976be67dd787e9e0N.tmp"C:\Users\Admin\AppData\Local\Temp\is-TMNPC.tmp\62357850a84f7ab4976be67dd787e9e0N.tmp" /SL5="$3014E,8572006,153088,C:\Users\Admin\AppData\Local\Temp\62357850a84f7ab4976be67dd787e9e0N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5c0b11a7e60f69241ddcb278722ab962f
SHA1ff855961eb5ed8779498915bab3d642044fc9bb1
SHA256a8d979460e970e84eacce36b8a68ae5f6b9cc0fe16e05a6209b4ead52b81b021
SHA512cb040aca6592310bffb72c898b8eb3ca8a46ff2df50212634c637593c58683c8ab62e0188da7aea362e1b063ae5db55cf4bf474295922af0ab94a526465cc472
-
Filesize
184KB
MD5c521e40e9843afeacf558d3a58f4ee58
SHA1f13c6226feab895cebfd5079d047c2f7c0a59df4
SHA25645385a852c4b7e62374592848632afaf32c315d80c100a217b8a0b428ce9dfd1
SHA512d12877fb4ad9a6cd47615c7d08c3d6dc26343a27d5d908d427b38495c87056b82605cd800ad1c05ecfd781463b0f07eddd3bbba59b87810448ae3835e1be56dd
-
Filesize
446KB
MD5dce6d68da86f44ba0cb70fa7718e2e84
SHA158cd39196abfc70b5b9bcc964f41a21024a61480
SHA256b9bdc4a0309aa47613a7b5a680c55839aa7ba28e28f96e6b9316d4d5fe1dbe9d
SHA512bd2f559640b63a46e15a2af90719c10e53e1c30020685163ed6b3bb669197d20d5dd76c7fd1052cf0841e3e1fdbd5a365a4bdb519d2f8fcad9122e77d923e8d6
-
Filesize
16KB
MD511f69393fe604c87fa0684dbe06abe8e
SHA13809ef17b996ce0030eab25fcd0345432b26cb82
SHA2561dd3e476a5e5e238fa55981d01f5eaaff94145d64450332e1d3f811e0952808b
SHA5124ac2d44638cd01f68e486b1127639e0e8375bb63f17a3cd98e6f8623e542612915643c2cd63df34ea7cd3d3adb2dd67e0b89a61c9bf8f71ff9dc549dfdc030e5
-
Filesize
3.0MB
MD5b0ca93ceb050a2feff0b19e65072bbb5
SHA17ebbbbe2d2acd8fd516f824338d254a33b69f08d
SHA2560e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246
SHA51237242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
129KB
MD570cd1d226553f3c0546664d76373fe67
SHA1509d03b6fce1e35b6e848ae88af52b7b9ff42d48
SHA25665a7e7fb213007ba2e285bb2c3e2df1a553990a2a3e26a0a6591f01ce6c87bc0
SHA5125b2487bfffb26ff76988f175e4aa97f7ae83b9dd747bd61ae7d3b338f04447a345186a715bfe0bb86c07cd5c3c829540fc4099254cfee20d873700573ef5826f
-
Filesize
1.9MB
MD5d1bc2df33def6a4f2e16a13b2242f014
SHA117d9c89bd2cd4e0bc014c8154d10ae482fd2d15b
SHA256c1b7758b136a7d3dfb0305c7b0fc6fa8671507f053604d47b08b23755f6108e3
SHA51224168ef8dd7d3eb7907ead6132c109635360468e1783ea437e93ca91374238cd43071e82aa876b4a7f6672b19786623276997e916ebd64ab57173a7cf907495b
-
Filesize
27KB
MD539a339e9c9ecc529202508c9c89a9956
SHA192e697882abb90cba6a783aef98d3d05deb8e4b9
SHA25688160915cd065e25bc0b9b89099663ccbcca606a5707a28a5df12e9c118d4f16
SHA512b96e3bac6da4e3812f09d21d575642beac47338c026f3bc116d42b09cfb492b1e51cc74cbb9d1724e744ec2129619b196247ca1ddc03d8c0a27a2613890cbef3
-
Filesize
1.5MB
MD5d95556420b65c52783e8cf422b62611a
SHA138d2421343d58eabf6afc763ce8d35a7346f31ff
SHA256e153bde25d0a3f8180acf43a69af32ee2fa220751709a09dfe3eb84bf2f71600
SHA512445b9e4509d9db430b47f18a5ab961fc31498fc6034a985a0d756d1f67e6d5a11d5ffc6ad49b5373b93a6489b8d755aa1be451445b2f184180121a7022fd2bb7