Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
73368423b1887911f781f49c538efe60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73368423b1887911f781f49c538efe60N.exe
Resource
win10v2004-20240802-en
General
-
Target
73368423b1887911f781f49c538efe60N.exe
-
Size
5.4MB
-
MD5
73368423b1887911f781f49c538efe60
-
SHA1
1058a0e6bbaeb83c85d410b6b3b9197c5fa72fbc
-
SHA256
f23a53f55327761bcd45e6159101f0c632f02b1593a61f737e5953b6fa037bf7
-
SHA512
3ecfddd640ba7f762c9336a315730665834bcdc0b10ad3eae2b38bb75f36af5463888cc3e1a53b13cd9b35fd93cd964a03a3a5ced1db101043990f875283e0d8
-
SSDEEP
98304:emhd1UryeoQ42oE53gV7wQqZUha5jtSyZIUh:elIEW2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 D00B.tmp -
Executes dropped EXE 1 IoCs
pid Process 2348 D00B.tmp -
Loads dropped DLL 2 IoCs
pid Process 1648 73368423b1887911f781f49c538efe60N.exe 1648 73368423b1887911f781f49c538efe60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73368423b1887911f781f49c538efe60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2348 1648 73368423b1887911f781f49c538efe60N.exe 31 PID 1648 wrote to memory of 2348 1648 73368423b1887911f781f49c538efe60N.exe 31 PID 1648 wrote to memory of 2348 1648 73368423b1887911f781f49c538efe60N.exe 31 PID 1648 wrote to memory of 2348 1648 73368423b1887911f781f49c538efe60N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\73368423b1887911f781f49c538efe60N.exe"C:\Users\Admin\AppData\Local\Temp\73368423b1887911f781f49c538efe60N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\D00B.tmp"C:\Users\Admin\AppData\Local\Temp\D00B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\73368423b1887911f781f49c538efe60N.exe 022789083EEF209B257C5A3F43E8D07509ABEB9DACAC5191D7D4721764991146180523891DC7206DB8007CD7C4A10BA31D121047DCA3F9073BAEF1B96298B9742⤵
- Deletes itself
- Executes dropped EXE
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD59a9fb8361e7ed29a80202c7d6823a878
SHA1ea33ac33bd522c1081cc74c3cc0a5a9056e939b1
SHA256289ed6b13ad47ae1f45da750c6f13bf132dd85cecc5f245004838539e6b2bcad
SHA5124303edbb31b82b5d88e02353ac88343031ac465eeefc8c274605eb2f5efb2858b9c21e988cfc2df8888e1f5ab5ffeee953ed36f03c50a1dae30376ba35eed9d5