Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
45c22d63d50c14cebdfb0e60649f5920N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45c22d63d50c14cebdfb0e60649f5920N.exe
Resource
win10v2004-20240709-en
General
-
Target
45c22d63d50c14cebdfb0e60649f5920N.exe
-
Size
32KB
-
MD5
45c22d63d50c14cebdfb0e60649f5920
-
SHA1
6e34156ede7dfb06ff7b003fdc1bc49572380f1a
-
SHA256
6343c97570eb074028b3ad8721941c17656eaa57eb4fe647fbae2c7c94253096
-
SHA512
420ce8a24b5b623f73e58125a99f3e91b9b1a800fb92feacdbb4fa2489a4c93a5a465290813059b17eed6a4270d4b32f80e0410eb30f40807672ebd9e45b9c05
-
SSDEEP
384:Q98xUHQwKqqfA1y4Ng8zLeiJerYphNfzPiSBDAggofgGCNszLg:TwJKI1/gopv1bP7MOg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinHttp = "C:\\Users\\Admin\\AppData\\Local\\WinHttp.exe" regedit.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45c22d63d50c14cebdfb0e60649f5920N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4420 regedit.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2224 45c22d63d50c14cebdfb0e60649f5920N.exe 2224 45c22d63d50c14cebdfb0e60649f5920N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 4420 2224 45c22d63d50c14cebdfb0e60649f5920N.exe 84 PID 2224 wrote to memory of 4420 2224 45c22d63d50c14cebdfb0e60649f5920N.exe 84 PID 2224 wrote to memory of 4420 2224 45c22d63d50c14cebdfb0e60649f5920N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c22d63d50c14cebdfb0e60649f5920N.exe"C:\Users\Admin\AppData\Local\Temp\45c22d63d50c14cebdfb0e60649f5920N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5f44153ef26be29552cf320325ad8b72e
SHA174ac72ba2ff0f871e59b11c95ad707372662370c
SHA256767009fb8726500a4bc54b2ee744cc3ada64fdf16a44e22ff9dfe7652e2a439f
SHA5121d42a4dba1d8d0df9f8fedfba384ffdbcff3103c8ba360f255b5d7e8a46128f40521e4d16cf6de04365b3b6ffad8bc681cf7042d92867ab3d912601a3d5e6e65
-
Filesize
32KB
MD52c9cead2f313507b10500beb7979fa79
SHA1f278eef8ed3763065ca40f8e7cb44b4e0d153ce0
SHA2567a58de0bbde4e5e1ff1e7dbb343fa5deb23e188e6e6e6c04a70edeff5731ecf9
SHA512042c8a8114fc72efc1f83cdfa028ef59c99c295b5bc6a6b6da9060502b442226f01dbe6199594146893165c3f7faea4fbafefcc7541d7df5741dd6c9d665eb0c