Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
5170322383551912c2aee7db8a3fe290N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5170322383551912c2aee7db8a3fe290N.exe
Resource
win10v2004-20240730-en
General
-
Target
5170322383551912c2aee7db8a3fe290N.exe
-
Size
821KB
-
MD5
5170322383551912c2aee7db8a3fe290
-
SHA1
11d09ff4ee8b69dd9ee0e3bc5224c2be1a293ad5
-
SHA256
47d2e9925f39d39d1bb42e3f51ad0883a35fd81bc597cae2e6c2e07652d016d4
-
SHA512
f5d1fcfaa822c915db8dfc0d281cb134ae25bcefda07c78dd5419de4fe7763dbc1a0e794b90374bfe29065457236c885ed71d7b6c773fab6e2547459c8b4e82b
-
SSDEEP
12288:UT+Wiw2pQh1CYB79z5vcxsPW4jxj2j4sQDaEts1LEelxKJLZmN1SazY:UTT2Gh1VExV252j7QyEelELZmN1SazY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2512 9673.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5170322383551912c2aee7db8a3fe290N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9673.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 2512 436 5170322383551912c2aee7db8a3fe290N.exe 83 PID 436 wrote to memory of 2512 436 5170322383551912c2aee7db8a3fe290N.exe 83 PID 436 wrote to memory of 2512 436 5170322383551912c2aee7db8a3fe290N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5170322383551912c2aee7db8a3fe290N.exe"C:\Users\Admin\AppData\Local\Temp\5170322383551912c2aee7db8a3fe290N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\9673.tmp"C:\Users\Admin\AppData\Local\Temp\9673.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD5c3513577f70efeb0d99f4f1447a238af
SHA1df136b4b1cd4d2bb4dd53ad8fec0164f29c7c622
SHA2569ac0616c6dc85b0fff8a0f4c71f92a607d4c47d8b708036a65d669884f81cec6
SHA512ae5a7d198481ae43f9442f0f3a1c97c89d54b20ab8fbb2677962b450ee561026878e50031c1d669d5e04f689588b4a9c3aabd83168dada6a1cd190e3e9ad45bc