Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
578e8e9dc475c414b821ab391ecc3fc0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
578e8e9dc475c414b821ab391ecc3fc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
578e8e9dc475c414b821ab391ecc3fc0N.exe
-
Size
44KB
-
MD5
578e8e9dc475c414b821ab391ecc3fc0
-
SHA1
57afd5b8f1ca4b11505cd9bf8c4816b7fb8db0b6
-
SHA256
e7d605f9cebefb0d2378f9292ecf6a7c35cf38c1f2197349a054c6f439c22f75
-
SHA512
3e386bbaf185f7a44ce9f0820daaa915adf75037d9b7fe6f75ddde62a74d067417a9ab3c3344ae571910bdde19b91534a3344ccc6d217ee17202cd5c6bdb7af3
-
SSDEEP
768:9Y8ZGkv7+1VV+om9CKfi7tJ/4BKh1bmQLxdU2+Hkl6i5:6eGkv7+1W9CKfi7tJ/4wHvLxt+s6i5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 dittunu.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 578e8e9dc475c414b821ab391ecc3fc0N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 578e8e9dc475c414b821ab391ecc3fc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dittunu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2592 2416 578e8e9dc475c414b821ab391ecc3fc0N.exe 30 PID 2416 wrote to memory of 2592 2416 578e8e9dc475c414b821ab391ecc3fc0N.exe 30 PID 2416 wrote to memory of 2592 2416 578e8e9dc475c414b821ab391ecc3fc0N.exe 30 PID 2416 wrote to memory of 2592 2416 578e8e9dc475c414b821ab391ecc3fc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\578e8e9dc475c414b821ab391ecc3fc0N.exe"C:\Users\Admin\AppData\Local\Temp\578e8e9dc475c414b821ab391ecc3fc0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\dittunu.exeC:\Users\Admin\AppData\Local\Temp\dittunu.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5dea6b61b160991caee27ab840eb1ee6a
SHA1ce3aa6b800d27b39ba6224fa8aa3c4f78be71510
SHA2568570388eab6a56a339a90c03c56d1c3a1c9ddf84deb337c0f4eb862e08a59120
SHA512258f83045397db0c31bb8741cced0a0a3b0cb2070c3c1dec93e90fe0fd27993a3aaa404f670e2b63e9b318093d9d3b9cffa9a28e329e2970886aa63439abd4b6