Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
8cd4381495b9c77954ada7cb26a9e0b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cd4381495b9c77954ada7cb26a9e0b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
8cd4381495b9c77954ada7cb26a9e0b0N.exe
-
Size
79KB
-
MD5
8cd4381495b9c77954ada7cb26a9e0b0
-
SHA1
1e50db4fdba1027f5a245992f64bf8503c17503d
-
SHA256
a7b6ee589f5176c1d0fe22443c403c6c97d5e19c322c887a777503882fa804b5
-
SHA512
a899427ccbfdb0abb3135a36f25f3d608fab26e707f58900523bca6289014ffc8ea1b0a43610a8d6150e4097f5df3838ab1d485933739c36688a719bf3d78c36
-
SSDEEP
1536:zvsva71+WE0bxOQA8AkqUhMb2nuy5wgIP0CSJ+5yVmB8GMGlZ5G:zv1/rEGdqU7uy5w9WMygN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cd4381495b9c77954ada7cb26a9e0b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3580 2020 8cd4381495b9c77954ada7cb26a9e0b0N.exe 85 PID 2020 wrote to memory of 3580 2020 8cd4381495b9c77954ada7cb26a9e0b0N.exe 85 PID 2020 wrote to memory of 3580 2020 8cd4381495b9c77954ada7cb26a9e0b0N.exe 85 PID 3580 wrote to memory of 2392 3580 cmd.exe 86 PID 3580 wrote to memory of 2392 3580 cmd.exe 86 PID 3580 wrote to memory of 2392 3580 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cd4381495b9c77954ada7cb26a9e0b0N.exe"C:\Users\Admin\AppData\Local\Temp\8cd4381495b9c77954ada7cb26a9e0b0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD50265f8a02e12313324f6ff4a3ae54722
SHA158ff0937a37b34c017b8bdf8f6abe293e04c28d9
SHA256be8063043816c6d91fcdb52d8cb701ba255a36257dc1e7be81b820e735a8226d
SHA5124f5bc87d83029c09d2359e43a52f8d40ef5ba4067d545bc3347f97082d44268d380d359327b7b19ec0fa073ff55c8757d44b4cae7af29b0b79f70ae531a3e1be