Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
3856e3b047e611fdd81ec52038dca630N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3856e3b047e611fdd81ec52038dca630N.exe
Resource
win10v2004-20240709-en
General
-
Target
3856e3b047e611fdd81ec52038dca630N.exe
-
Size
73KB
-
MD5
3856e3b047e611fdd81ec52038dca630
-
SHA1
fe979e03a5672f8345619fb59550217406259784
-
SHA256
361b523225bed9a10ae2ead054a328507d85febe54ebdf56cf74bc173a9af64c
-
SHA512
c4da868f16cba2a4f1345f30d6232b92306bc759096e2fc7d7b39b808fa5c120da6ab3a2c14e2df930cdff2ae3e7864785a41de895c2669708925f9b03d84156
-
SSDEEP
1536:hb2ABIIlTajK5QPqfhVWbdsmA+RjPFLC+e5h90ZGUGf2g:h6Wl4NPqfcxA+HFsh9Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2872 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3856e3b047e611fdd81ec52038dca630N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1388 wrote to memory of 3428 1388 3856e3b047e611fdd81ec52038dca630N.exe 85 PID 1388 wrote to memory of 3428 1388 3856e3b047e611fdd81ec52038dca630N.exe 85 PID 1388 wrote to memory of 3428 1388 3856e3b047e611fdd81ec52038dca630N.exe 85 PID 3428 wrote to memory of 2872 3428 cmd.exe 86 PID 3428 wrote to memory of 2872 3428 cmd.exe 86 PID 3428 wrote to memory of 2872 3428 cmd.exe 86 PID 2872 wrote to memory of 3620 2872 [email protected] 87 PID 2872 wrote to memory of 3620 2872 [email protected] 87 PID 2872 wrote to memory of 3620 2872 [email protected] 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3856e3b047e611fdd81ec52038dca630N.exe"C:\Users\Admin\AppData\Local\Temp\3856e3b047e611fdd81ec52038dca630N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵
- System Location Discovery: System Language Discovery
PID:3620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5890974533e12d80bfeba128ed74087f9
SHA1c9c8dfda22522a3bfc8f5e137f256b5c871322bf
SHA256634ab8f8b5f504b28819cbd360daa076af1b768a2c1d17484f65fb506f3b2bc0
SHA5127127c7e3ed7ac0bc752d7ca4a289506bca356fd8da809ae796693c8972b2d1ae0f3ee705da87312f0976ae3b3422b8a3545431f7c0a45dadbe7ed277e2495f51
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1