Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe
Resource
win10v2004-20240709-en
General
-
Target
7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe
-
Size
5.4MB
-
MD5
9b3bce9cbe1ebf4b607e2e9c56a43429
-
SHA1
af15d8e36a9499fea9b943611a0858eaccdc5344
-
SHA256
7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9
-
SHA512
a1e3d1b21cd7f590c54fd48ef4d0d572297060a502fd80eec8e9c4dc610060908ae04c4b424a20c6a134d79e29dfcf124a9cb40b758b17b838185c49ba8442fe
-
SSDEEP
98304:emhd1UryeFXoKWw3L6SsLgkuV7wQqZUha5jtSyZIUh:el6KWU6Vgku2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 2980.tmp -
Executes dropped EXE 1 IoCs
pid Process 2768 2980.tmp -
Loads dropped DLL 2 IoCs
pid Process 2012 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe 2012 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2768 2012 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe 30 PID 2012 wrote to memory of 2768 2012 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe 30 PID 2012 wrote to memory of 2768 2012 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe 30 PID 2012 wrote to memory of 2768 2012 7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe"C:\Users\Admin\AppData\Local\Temp\7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7691a0d73b96b83201876c069fbc9b6360accaa29ba293c6703f7a696902daa9.exe 3166ECF9A710126F5BC45B6DCF72334741D45A4133889B6BDE229FAE678007ED0C7ACF5875B331DDCF150A794EDE05391E98DCC915A076150A979482EA62C1C22⤵
- Deletes itself
- Executes dropped EXE
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD535c7636c08e3aa39dfbe4507362bac44
SHA10263e240c89ae8491fb05d7d7527148b66770399
SHA2565d09360fba3834caf2818c00b78bb6743a792a1e06d404964e3b984a66999d99
SHA512924ff378589f910f3b8df4986141255124c3763f48169420a0821cdfca083d65550905eb1e7683121027df2a2094d739102e4aa7e4280527f8a115d1b640eac2