Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
cf7fe3654dd6d8b8adc0959934eb5990N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cf7fe3654dd6d8b8adc0959934eb5990N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf7fe3654dd6d8b8adc0959934eb5990N.exe
-
Size
79KB
-
MD5
cf7fe3654dd6d8b8adc0959934eb5990
-
SHA1
cd7e68f57e6eeceac6e67eeec21a7875a8622d2e
-
SHA256
bb554c0dac804d462fa44ec85cf420be37bfcfead24e475e77b82588297546c0
-
SHA512
93696ecc81deb7a4406ea9c819b7ffe2369e5b26b37d057d3c02656fd7bf1b07397453493aba343150b68674d270a78ff589e349e17fe85a0962bc27ceca0f39
-
SSDEEP
1536:zvI/UIvqd/7oYvzsYaKOQA8AkqUhMb2nuy5wgIP0CSJ+5y3KgB8GMGlZ5G:zvIZqdDNsYa/GdqU7uy5w9WMy3KgN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2368 cmd.exe 2368 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf7fe3654dd6d8b8adc0959934eb5990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2368 2120 cf7fe3654dd6d8b8adc0959934eb5990N.exe 31 PID 2120 wrote to memory of 2368 2120 cf7fe3654dd6d8b8adc0959934eb5990N.exe 31 PID 2120 wrote to memory of 2368 2120 cf7fe3654dd6d8b8adc0959934eb5990N.exe 31 PID 2120 wrote to memory of 2368 2120 cf7fe3654dd6d8b8adc0959934eb5990N.exe 31 PID 2368 wrote to memory of 1996 2368 cmd.exe 32 PID 2368 wrote to memory of 1996 2368 cmd.exe 32 PID 2368 wrote to memory of 1996 2368 cmd.exe 32 PID 2368 wrote to memory of 1996 2368 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf7fe3654dd6d8b8adc0959934eb5990N.exe"C:\Users\Admin\AppData\Local\Temp\cf7fe3654dd6d8b8adc0959934eb5990N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5bb4858f8b055109dd494ac159f68f38c
SHA1224812cf02b8cb4148a42684e63d72cf7595edda
SHA256e5da67e0cbe4ac423f811d6796ca084d33e027b8fb062225a7310885310183c8
SHA512b89fe43535e830280316f2dc3ba191c1dff9b54df17f8357183105c5e8440e6491ca7d000fd47464f088ee837d9e52362d2a3d00d78799d02c38fba74ebf0717