Analysis
-
max time kernel
101s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
56d2f1912390df2f3ba5c89dfb15a120N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
56d2f1912390df2f3ba5c89dfb15a120N.exe
Resource
win10v2004-20240709-en
General
-
Target
56d2f1912390df2f3ba5c89dfb15a120N.exe
-
Size
63KB
-
MD5
56d2f1912390df2f3ba5c89dfb15a120
-
SHA1
121ed149f775a2aaa6da556ec6f9639502700d83
-
SHA256
29cf2365457ff628736a57b1a13fcbc3851dcf72fddd78468dd6256a01714e08
-
SHA512
b1d993046dbbfe2236c5a8617ba8a0b49b221b0d1fd15f95c27b63d394869567be64e6cbf3b45252e27e578a9fc693f6ef50e70a242aa90b218ba497b8b38719
-
SSDEEP
1536:fwA8rPOSW39WidI/7qK24vptwdxZRuCwAP/+wlW/:78rPYdI/7qyvptcxP5PWwlW/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3488 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56d2f1912390df2f3ba5c89dfb15a120N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3488 4940 56d2f1912390df2f3ba5c89dfb15a120N.exe 84 PID 4940 wrote to memory of 3488 4940 56d2f1912390df2f3ba5c89dfb15a120N.exe 84 PID 4940 wrote to memory of 3488 4940 56d2f1912390df2f3ba5c89dfb15a120N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\56d2f1912390df2f3ba5c89dfb15a120N.exe"C:\Users\Admin\AppData\Local\Temp\56d2f1912390df2f3ba5c89dfb15a120N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5acaeed5b550b76ab55c3574779bfbc19
SHA1fcdaf270d2b9b0d66feb25605387bc75182cc7e6
SHA2560ea34803a278033303b135828821345439e6f2a8c49eb2e305a60869af448819
SHA512a544fa32cdb56959ff9798cd2bc8242569aecd7a4841e9bcaadabbf22899759bc084e13dbc91e6b05d9a77728fc4b0916a83a4e1b4375e63f54722ff5ddc1400