Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe
Resource
win10v2004-20240730-en
General
-
Target
246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe
-
Size
31KB
-
MD5
ccf495e96b65d7549094264657c61cc3
-
SHA1
1957139fee7bab68ee2906a8b5643e5204c514dc
-
SHA256
246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e
-
SHA512
3bf81449797e77fda63ab72a98c030297aceb5dcba32b14dd572934a424ae1f8cb9b61aec40d893f7a610e76c77f1b7ba9a0a547ea906f83fca3aaa43406889c
-
SSDEEP
384:uhLCP1R8XnzvuwT0pZwBeH7lQDizU11u54TV0L4S0w9Z:cCcvuwU6eHhQDi41U4TGL10wT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 codecupdater.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29 PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29 PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29 PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29 PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29 PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29 PID 2180 wrote to memory of 2044 2180 246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe"C:\Users\Admin\AppData\Local\Temp\246765fc96bbf96e9713629a2a01e19c4d57c268e679c13588b298b5d9bdf05e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\codecupdater.exe"C:\Users\Admin\AppData\Local\Temp\codecupdater.exe"2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD52ddb6612ca5c66beb5c21a01cd9432da
SHA1afc873427fe6486267f13e3f0ed362d0267d8ce0
SHA2561df41b6dabe912911639377290886ab38fba4e298f01f936d5d71e02984354b8
SHA5120bed0aabfa9de918cdb5974893ce9c0dfbd5b978146304579d2f55f288dba0e3c8764d22c0c1be85104939377c46f7023b7155124bfebf4ac3a42c4051186c5d