Analysis
-
max time kernel
37s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 12:07
Static task
static1
Behavioral task
behavioral1
Sample
221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe
Resource
win10v2004-20240730-en
General
-
Target
221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe
-
Size
1.2MB
-
MD5
016dd3b7ef3af07dd9f93d8667594bcc
-
SHA1
223f4f2cb3629d0fff975c0f02919de7aa8d06d3
-
SHA256
a5edb017a2c0bf9834ff392e81d47ed90dade6e41c0549a8b3e9522e76d2c8c2
-
SHA512
8f289265a120e31197f05165c2cfda4de3511bfced536ea4ca7524337cfb0f0c6156288b8adc200b060fcf899e7feda46b9bb6a5643e11a27ed8904b7840a4ce
-
SSDEEP
24576:eqDEvCTbMWu7rQYlBQcBiT6rprG8aftISUniH2iZiToNB:eTvC/MTQYxsWR7aftB2iZikN
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 2640 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2640 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 30 PID 1984 wrote to memory of 2640 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 30 PID 1984 wrote to memory of 2640 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 30 PID 1984 wrote to memory of 2640 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 30 PID 1984 wrote to memory of 2640 1984 221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe"C:\Users\Admin\AppData\Local\Temp\221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\221588+226312+226353+221632+223868+223933GEODIS+SEA AIRCTP.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD58760abd507dc8894764b018726eaf331
SHA142b747c9b77619d2fb7a0460982f94845d2d8d91
SHA25650415ecc1ee348db9ddcf3436cf3c4ad8939f48b6d9d779c8c517314ed9f8029
SHA51270442e1a24fd5fe692dd44cd8c8b55327f89a84202f5c38e2cf78a4660fefa5e4120793bcab328fb41aff0ffc8f5424dfdf3d07231625fd31491338c8238d377