Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
b7145f4e9cda9478b08061c031f7eee0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7145f4e9cda9478b08061c031f7eee0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b7145f4e9cda9478b08061c031f7eee0N.exe
-
Size
35KB
-
MD5
b7145f4e9cda9478b08061c031f7eee0
-
SHA1
6e8305187e9398186ddcdc2d6455721970261db9
-
SHA256
af7cfe02bf94a0adb6895c021ed176c4e644ca3a39f407ca630adfba39e37282
-
SHA512
1601ee4b5bdb89b3be61f548e08fa550646876a69c1027b2bb709b86fa4d024c59fe5e9ad3fbb6f8cca24785f4993c9e275685805e510496a7ef64e1b9facf1e
-
SSDEEP
768:6eeI2//kFi7tCV6rtfZYjBUfyL4Mk9WBNvnFRtDHB4:622nkFi7thRfZYtUfyL4Mk9WBNXtV4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1144 ofadebux.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7145f4e9cda9478b08061c031f7eee0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ofadebux.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1144 4576 b7145f4e9cda9478b08061c031f7eee0N.exe 84 PID 4576 wrote to memory of 1144 4576 b7145f4e9cda9478b08061c031f7eee0N.exe 84 PID 4576 wrote to memory of 1144 4576 b7145f4e9cda9478b08061c031f7eee0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7145f4e9cda9478b08061c031f7eee0N.exe"C:\Users\Admin\AppData\Local\Temp\b7145f4e9cda9478b08061c031f7eee0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\ofadebux.exeC:\Users\Admin\AppData\Local\Temp\ofadebux.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD546242d592ee3eab3d97c7906ec4c412e
SHA19257b5680738bb35978021c0f118964ea4cc1da5
SHA25602b4719711c7a5d7584ad96a886c62477ec3f7622d05f3f53e7045cb5d4daae1
SHA5126ba7f6734278a8d93c53db27441b01d97df07eda4701898e9239df4c39bbaff7fa1155e14e6222f822a791bcc9ce40453cadbeb8f808fa65daa7dbc57dc1f1bc