Analysis
-
max time kernel
30s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
3b297e719299b387cc2e1e625d335e60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b297e719299b387cc2e1e625d335e60N.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
3b297e719299b387cc2e1e625d335e60N.exe
-
Size
73KB
-
MD5
3b297e719299b387cc2e1e625d335e60
-
SHA1
345b5cb0ca95dca6d2181a6877ad91c7e58d8312
-
SHA256
6fc2349b62228f4ce06a4d3f2fbba05bb408b0c7ea649258e2d0e514c6a8ae33
-
SHA512
8f4d8219d2d1ff8183d94c6b764a0294fe21b9bdbd3cf2e8ea2a83501d9f28104d7a143666a40295fd4a58ea0af0b346d8e3b84adbd4181fe7e9d2ad5c7f6df7
-
SSDEEP
1536:hbnbsJpNK5QPqfhVWbdsmA+RjPFLC+e5hm0ZGUGf2g:hkpNNPqfcxA+HFshmOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2648 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b297e719299b387cc2e1e625d335e60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 896 wrote to memory of 940 896 3b297e719299b387cc2e1e625d335e60N.exe 84 PID 896 wrote to memory of 940 896 3b297e719299b387cc2e1e625d335e60N.exe 84 PID 896 wrote to memory of 940 896 3b297e719299b387cc2e1e625d335e60N.exe 84 PID 940 wrote to memory of 2648 940 cmd.exe 86 PID 940 wrote to memory of 2648 940 cmd.exe 86 PID 940 wrote to memory of 2648 940 cmd.exe 86 PID 2648 wrote to memory of 3880 2648 [email protected] 87 PID 2648 wrote to memory of 3880 2648 [email protected] 87 PID 2648 wrote to memory of 3880 2648 [email protected] 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b297e719299b387cc2e1e625d335e60N.exe"C:\Users\Admin\AppData\Local\Temp\3b297e719299b387cc2e1e625d335e60N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD59447f5ccaa4ceb7270a06fd9490dca85
SHA14ae31c32c5f5f00cf3e075d0359249b392c3de18
SHA256e1c641c6b1684cf63097aa45a46283a5782991151bcc544aca485ec503df19a8
SHA5126438b254386ed23c637d5d80ec21ad900cd286f25b54df2b3927c46b6adbec89a0ee764ba263a919d941824eeca90eb12e88aefb6672601d74802ea4695dd3b6
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1