Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
3434c7dc6d2b9f4fb09090d3a6f4c970N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3434c7dc6d2b9f4fb09090d3a6f4c970N.exe
Resource
win10v2004-20240802-en
General
-
Target
3434c7dc6d2b9f4fb09090d3a6f4c970N.exe
-
Size
73KB
-
MD5
3434c7dc6d2b9f4fb09090d3a6f4c970
-
SHA1
da7c449729caf6f522bf50a5198241d057550447
-
SHA256
382c876bf080c2a0deb414de114f5239a23e2b9796f90aef9b8346b902ea06c1
-
SHA512
01782b9505f5f04cd4d4f1394022d48d788c090295dbefdb07461879c858bc81f8502301efbe43704724e27ec7039f081cd1769e3323a3fd1eabe6bac61b2eff
-
SSDEEP
1536:hb46qyOAm6K5QPqfhVWbdsmA+RjPFLC+e5hz0ZGUGf2g:hRqyOAbNPqfcxA+HFshzOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 232 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3434c7dc6d2b9f4fb09090d3a6f4c970N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1944 2076 3434c7dc6d2b9f4fb09090d3a6f4c970N.exe 84 PID 2076 wrote to memory of 1944 2076 3434c7dc6d2b9f4fb09090d3a6f4c970N.exe 84 PID 2076 wrote to memory of 1944 2076 3434c7dc6d2b9f4fb09090d3a6f4c970N.exe 84 PID 1944 wrote to memory of 232 1944 cmd.exe 86 PID 1944 wrote to memory of 232 1944 cmd.exe 86 PID 1944 wrote to memory of 232 1944 cmd.exe 86 PID 232 wrote to memory of 3952 232 [email protected] 87 PID 232 wrote to memory of 3952 232 [email protected] 87 PID 232 wrote to memory of 3952 232 [email protected] 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3434c7dc6d2b9f4fb09090d3a6f4c970N.exe"C:\Users\Admin\AppData\Local\Temp\3434c7dc6d2b9f4fb09090d3a6f4c970N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD527c3ac50553510cf1d6d0e519e603bcd
SHA152cffc884d2c21b15c484006504bf532153a2fd3
SHA2563e2ba3ac76e98470b0361b185e2247ebd6169eef1739553e8a7c4f21dd48b318
SHA5121ad5cdbb103def82a1f58820e7326c5e23ffbfad9bab9cd722c8fe40dad5201e27986dcb8e2583dd32bdcccebe2ae7dd61e12978a6bb11db508f9d41e86fb7ec
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1