Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
Resource
win10v2004-20240802-en
General
-
Target
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
-
Size
7.0MB
-
MD5
fdb51b23c2f9e1a1e4c3af04cc05274b
-
SHA1
2d5414d5b74f632a4af1470f1ee747041b150804
-
SHA256
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848
-
SHA512
0117f5a078b69607f17691fd7ad0646e5f4dbf00ce79b601d65039eef5d0385c68056f3d24ff2006276ad5e304e8e595a67055b0312169e6f422209014fa097c
-
SSDEEP
98304:emhd1Urye2NZAhDV6OSV7wQqZUha5jtSyZIUbn:elWNZQJ3S2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2528 CA22.tmp -
Executes dropped EXE 1 IoCs
pid Process 2528 CA22.tmp -
Loads dropped DLL 2 IoCs
pid Process 1748 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 1748 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2528 1748 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 31 PID 1748 wrote to memory of 2528 1748 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 31 PID 1748 wrote to memory of 2528 1748 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 31 PID 1748 wrote to memory of 2528 1748 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe"C:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\CA22.tmp"C:\Users\Admin\AppData\Local\Temp\CA22.tmp" --splashC:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe DAAF7A264483BB081D3D479FA56C87CC73D7AF607D6C4E45C3D79AC969B703BFB66636A12E8147EE635976F37B9C10BCE3E819EF8563146DAB3E267AD3BE0FB02⤵
- Deletes itself
- Executes dropped EXE
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD57f54002f2c7bacd9e23a01443a8f9e15
SHA121669d6baccb49d7d27435006a43ccd01a82ab81
SHA25646f2c1c5272b50fa54217cee7a88ace7fd932103f0bb1ee9ba47befdd399ba28
SHA51205eac50ca802c6ba43ac948a8c05a14a8b494b408aecdeb342a9d33810637c8c53326a0de2d62e35b2d3e4028f9124cca8bf36bba55f3bfedf6e5f193e94765d