Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 14:44
Behavioral task
behavioral1
Sample
bdf8e0421d4ab8232fd8b7502868bed0N.exe
Resource
win7-20240704-en
General
-
Target
bdf8e0421d4ab8232fd8b7502868bed0N.exe
-
Size
59KB
-
MD5
bdf8e0421d4ab8232fd8b7502868bed0
-
SHA1
f93a476696e6d2319a2924fe4d82c128e5272cba
-
SHA256
9aa0b5a42c92fd508f0e7cb0d5283702af541386fe9d72879286f674dff1044e
-
SHA512
94750e5fbea57858244c258afc40e53ae443295c24509f3fa4676314af803e90c00d7777408a339fc80cef592b8d2f843d2decd8846520b0f6f1c13181db8f77
-
SSDEEP
1536:x+nnz2/x0evObr46NKutFW0JJSr/0LYLE7E:x+nnOx0eWbrlNnD5SI88E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4516 bdf8e0421d4ab8232fd8b7502868bed0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 bdf8e0421d4ab8232fd8b7502868bed0N.exe -
resource yara_rule behavioral2/memory/4884-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x0008000000023394-11.dat upx behavioral2/memory/4516-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdf8e0421d4ab8232fd8b7502868bed0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4884 bdf8e0421d4ab8232fd8b7502868bed0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4884 bdf8e0421d4ab8232fd8b7502868bed0N.exe 4516 bdf8e0421d4ab8232fd8b7502868bed0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4516 4884 bdf8e0421d4ab8232fd8b7502868bed0N.exe 84 PID 4884 wrote to memory of 4516 4884 bdf8e0421d4ab8232fd8b7502868bed0N.exe 84 PID 4884 wrote to memory of 4516 4884 bdf8e0421d4ab8232fd8b7502868bed0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdf8e0421d4ab8232fd8b7502868bed0N.exe"C:\Users\Admin\AppData\Local\Temp\bdf8e0421d4ab8232fd8b7502868bed0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\bdf8e0421d4ab8232fd8b7502868bed0N.exeC:\Users\Admin\AppData\Local\Temp\bdf8e0421d4ab8232fd8b7502868bed0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5c36125b88278cc4a014e7d54817834ab
SHA13bd6894803b8b422f1c8c5e7c4704d15f2882ec6
SHA256d52ecb97edee906d35b9ce2347ebfe7161e5e6c565651524a34a974501f9b72d
SHA5127685c9cb0d2e7aa80f3299e2eb41832b5394be488e50cf6ff9cd4570f6824cd4234dea7dae58e2607912b6da9b3e6f63d28e21041909474488aa5b2a969318cf