Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
Resource
win10v2004-20240802-en
General
-
Target
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
-
Size
7.0MB
-
MD5
fdb51b23c2f9e1a1e4c3af04cc05274b
-
SHA1
2d5414d5b74f632a4af1470f1ee747041b150804
-
SHA256
6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848
-
SHA512
0117f5a078b69607f17691fd7ad0646e5f4dbf00ce79b601d65039eef5d0385c68056f3d24ff2006276ad5e304e8e595a67055b0312169e6f422209014fa097c
-
SSDEEP
98304:emhd1Urye2NZAhDV6OSV7wQqZUha5jtSyZIUbn:elWNZQJ3S2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3548 98A6.tmp -
Executes dropped EXE 1 IoCs
pid Process 3548 98A6.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98A6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3548 2068 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 86 PID 2068 wrote to memory of 3548 2068 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 86 PID 2068 wrote to memory of 3548 2068 6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe"C:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\98A6.tmp"C:\Users\Admin\AppData\Local\Temp\98A6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 053BA8C20BBDFB2D8A941033671843B7F7C16292EABCA61DB0829F2967DAF16AC8EAF3700EC2A556A97CAC9BE0D8B378555BD44D31B5787B7F38CB143B372AF92⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5d1a04bc03903c42877d77bdf8b28e1ec
SHA19c44aafef5a46cff03f1a8d5e6b7576e4a47e63d
SHA256064511d61979f7fcc06dafdf3d13089d3e2d1fe78092b6225a630e29ea6bf363
SHA512653c303057cb8fc984d727e8d503ec99ed05da272802775eb14c5c7d475cffbb08b4cd9e8a1348be1ca09850c41c4fb7c1a2d5e4f06d4acd9f34decf0a30cd00