Analysis
-
max time kernel
92s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe
Resource
win10v2004-20240802-en
General
-
Target
2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe
-
Size
1.2MB
-
MD5
e5a8aa7318e57fc87cb8084aee10ba3e
-
SHA1
8193ea581ec0d1f7aff6eed0e7500c9854007eb2
-
SHA256
2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b
-
SHA512
9b85af3e5c0331670e287c5790adcccf5943518e9416bf30fa4d8046ba82ea0ee650e4d73e003fb20f29b8ce7c467bd146b5f0932ea8b9622490e4f3825f6cad
-
SSDEEP
24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8alFbduopERCLaw0:9TvC/MTQYxsWR7alFbdu0ERC
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4732 set thread context of 216 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4732 wrote to memory of 216 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 84 PID 4732 wrote to memory of 216 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 84 PID 4732 wrote to memory of 216 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 84 PID 4732 wrote to memory of 216 4732 2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe"C:\Users\Admin\AppData\Local\Temp\2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\2b8946b223d05ee6c5618cd01a33279f313e4538b2b1a1155d6457b9d6a0624b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD51a936b43e06da6e92e064a57e453dbab
SHA190915d29f67a133979eb62961d1a18241863d565
SHA25679a0a0d0debaf73f18c16b80b3fa9685eceb5ef5f4fd3271025869156b9e3c3a
SHA5122a10b46a2b1ac352d58c41094946ffab3b4d699d3ca9d824edbf65053efb4e0c1dfbf37ee6e2ac955006433b9c28e210047d343650e542429793ab6468549e6f