Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 09:35
Behavioral task
behavioral1
Sample
7dad2c4407957ac063b27b5dbbe8e596.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
7dad2c4407957ac063b27b5dbbe8e596.exe
-
Size
4.9MB
-
MD5
7dad2c4407957ac063b27b5dbbe8e596
-
SHA1
9309ba525bd5486667017d84a15a94f18616c125
-
SHA256
eefe4186b76670dd5d2a0e69ff14d4833333cd4b047a3f2260a736fd69da4a79
-
SHA512
f7ee96644ca686dde3686cc7c920c2ce43b6d8e81458d3f24fa38cb1f33a04c079097caaa7847c4b00b25e6115c7ac619caa50a70840020103dc59ab96f9c2e6
-
SSDEEP
98304:cHq30uZ1rpxCcHiU7g/iftzaGS107AJ121Ghl8LcFRrgDn7LgckWofmgC/g:czuFxCSx7gKJS10UT2Cl8APsTV4fmPY
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4936-0-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-2-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/4936-1-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-3-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-5-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-7-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-10-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-11-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-13-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-14-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-16-0x00000000002B0000-0x00000000011BE000-memory.dmp upx behavioral2/memory/3948-17-0x00000000002B0000-0x00000000011BE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7dad2c4407957ac063b27b5dbbe8e596.exe7dad2c4407957ac063b27b5dbbe8e596.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dad2c4407957ac063b27b5dbbe8e596.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dad2c4407957ac063b27b5dbbe8e596.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7dad2c4407957ac063b27b5dbbe8e596.exe7dad2c4407957ac063b27b5dbbe8e596.exepid process 4936 7dad2c4407957ac063b27b5dbbe8e596.exe 3948 7dad2c4407957ac063b27b5dbbe8e596.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7dad2c4407957ac063b27b5dbbe8e596.exedescription pid process target process PID 4936 wrote to memory of 3948 4936 7dad2c4407957ac063b27b5dbbe8e596.exe 7dad2c4407957ac063b27b5dbbe8e596.exe PID 4936 wrote to memory of 3948 4936 7dad2c4407957ac063b27b5dbbe8e596.exe 7dad2c4407957ac063b27b5dbbe8e596.exe PID 4936 wrote to memory of 3948 4936 7dad2c4407957ac063b27b5dbbe8e596.exe 7dad2c4407957ac063b27b5dbbe8e596.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dad2c4407957ac063b27b5dbbe8e596.exe"C:\Users\Admin\AppData\Local\Temp\7dad2c4407957ac063b27b5dbbe8e596.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\7dad2c4407957ac063b27b5dbbe8e596.exeC:\Users\Admin\AppData\Local\Temp\7dad2c4407957ac063b27b5dbbe8e596.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-