Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
6aebfb5f5633404634d1d1ffaa962820N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6aebfb5f5633404634d1d1ffaa962820N.exe
Resource
win10v2004-20240802-en
General
-
Target
6aebfb5f5633404634d1d1ffaa962820N.exe
-
Size
29KB
-
MD5
6aebfb5f5633404634d1d1ffaa962820
-
SHA1
1c6fd52fc7726d4c7ac1597ed59874ffb3d2268f
-
SHA256
4f844ecae6ec1799c6dfd917f8da5f19fb863ed842a01e34a18db32147e04bf0
-
SHA512
2c385765be5df80b426029a31d16c52d0b5925b122e582f3cb706ce38e6a4ddc5cdf17dd6767b574d561d6b1cf880016fae1b5781dd413aefba19ebd0003284e
-
SSDEEP
384:v/4LNJY74JwOllSBQmrb0i5PrmqHIKpa54b5f0iws0wGXeE:v/qSamrxDmqoKM4Z0iwtwAZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 2024080307.exe -
Loads dropped DLL 2 IoCs
pid Process 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 2652 6aebfb5f5633404634d1d1ffaa962820N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aebfb5f5633404634d1d1ffaa962820N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024080307.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 2716 2024080307.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2716 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 30 PID 2652 wrote to memory of 2716 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 30 PID 2652 wrote to memory of 2716 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 30 PID 2652 wrote to memory of 2716 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 30 PID 2652 wrote to memory of 2852 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 31 PID 2652 wrote to memory of 2852 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 31 PID 2652 wrote to memory of 2852 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 31 PID 2652 wrote to memory of 2852 2652 6aebfb5f5633404634d1d1ffaa962820N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aebfb5f5633404634d1d1ffaa962820N.exe"C:\Users\Admin\AppData\Local\Temp\6aebfb5f5633404634d1d1ffaa962820N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\2024080307.exeC:\Users\Admin\AppData\Local\Temp\2024080307.exe down2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\del.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD525e7fed514a7c8a5ff5a1f5f608b7555
SHA1db278aade8a1b8a4474b369e0bd9c00dc4628831
SHA25692b52f95b67f4c7b09ea806eb339939e5567dde82069718c88ff0bc361048e7d
SHA512d0033d45c98000735ea785e6cd2a34843c764fd81c0152a3b09a65c28c0d2612da2552adee365674ae1970c29010b424bb721cf23e9938385d8a31ebaface51a
-
Filesize
174B
MD585865696552da793a4c8ed52ab95a174
SHA1f9a5acccda63787541dad36ecf2a5ee9f304c90a
SHA256b414467bd4a7043f2c4debda871dbe549eb129d3b180158aa4a32be22c00e53f
SHA512cae0f8a9fb082898b444283627cd8bd546acfaaf241278a7f6ba5e172de25e0f0b003bd51c0a712884e737fdce500d76516fb882589b1d7028acc238d209f07b