Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
69be3d3443e619b7df35cc7e8f9f6a50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69be3d3443e619b7df35cc7e8f9f6a50N.exe
Resource
win10v2004-20240802-en
General
-
Target
69be3d3443e619b7df35cc7e8f9f6a50N.exe
-
Size
5.4MB
-
MD5
69be3d3443e619b7df35cc7e8f9f6a50
-
SHA1
acaf1cb8ec51d54e8d3b0281bd02b059b66791ce
-
SHA256
130a9133e751221a661fc2f9c4eda28faa9f309528812d76fbf3f170af6533fd
-
SHA512
2a2d44fa0a97e85ec68d581c21fc551cd9ab4e2bb244870f1ac1942af143204ef84d2a5934c3af33dd0b1e3acaade64ba8d961cb9f9a32d3947bcf9fca42f259
-
SSDEEP
98304:emhd1UryeOpuwTInFmqhucZaPIV7wQqZUha5jtSyZIUh:elJcyhEPI2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 D3D3.tmp -
Executes dropped EXE 1 IoCs
pid Process 2276 D3D3.tmp -
Loads dropped DLL 2 IoCs
pid Process 2608 69be3d3443e619b7df35cc7e8f9f6a50N.exe 2608 69be3d3443e619b7df35cc7e8f9f6a50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69be3d3443e619b7df35cc7e8f9f6a50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2276 2608 69be3d3443e619b7df35cc7e8f9f6a50N.exe 31 PID 2608 wrote to memory of 2276 2608 69be3d3443e619b7df35cc7e8f9f6a50N.exe 31 PID 2608 wrote to memory of 2276 2608 69be3d3443e619b7df35cc7e8f9f6a50N.exe 31 PID 2608 wrote to memory of 2276 2608 69be3d3443e619b7df35cc7e8f9f6a50N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\69be3d3443e619b7df35cc7e8f9f6a50N.exe"C:\Users\Admin\AppData\Local\Temp\69be3d3443e619b7df35cc7e8f9f6a50N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\D3D3.tmp"C:\Users\Admin\AppData\Local\Temp\D3D3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\69be3d3443e619b7df35cc7e8f9f6a50N.exe 3509B49BAC20C44C83C33B7CF301B84A4E631B23DE2B028ABD3AD9C5338BCADD88568632AAFB757DA8AD27B3F0F446030F5282BFF49AC6844C5DBFB8AF6783332⤵
- Deletes itself
- Executes dropped EXE
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5afd7de59ca9125112554fdedff2d84f0
SHA1e3a3476a4f22d2412ee91621aa465b94f025495e
SHA256b197cddcf336b244a27240b7b49aeabff02b26bedcbc1d6722c47e712e32e099
SHA512452c862045dba620282d44f41bdbc6ceb8b476c46fbf129d3006f3b02c31a1aff9e3052bd98d4c6e48a8ff834f42a37a3bb31cf78d89d42708480e794b644011