Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
7d89d473d7d5197aa0c44c01eb69d620N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7d89d473d7d5197aa0c44c01eb69d620N.exe
Resource
win10v2004-20240802-en
General
-
Target
7d89d473d7d5197aa0c44c01eb69d620N.exe
-
Size
384KB
-
MD5
7d89d473d7d5197aa0c44c01eb69d620
-
SHA1
d2df580e34d72d8829e0d00f29586a1026c10416
-
SHA256
21b32a1e3ba18f9c1600a5f093a528668a93dacbe09526f4cb2fdae76b1eea13
-
SHA512
f11221e952eef6b1ed43d02e95695485adea987ecbae4d503cdd6e56757cb10acde9efeec1d57266224e5acf61036a339f6093b4585619f2e46ed654dca57ae3
-
SSDEEP
6144:bfb4EjyM6ro0dk46MKq8l/UdpWdDJboY4sJ9pALL7j11:bfsEO9o0e46MKq8l/Udp6D9d9pAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2012 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Loads dropped DLL 1 IoCs
pid Process 484 7d89d473d7d5197aa0c44c01eb69d620N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d89d473d7d5197aa0c44c01eb69d620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2012 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 484 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2012 7d89d473d7d5197aa0c44c01eb69d620N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 484 wrote to memory of 2012 484 7d89d473d7d5197aa0c44c01eb69d620N.exe 30 PID 484 wrote to memory of 2012 484 7d89d473d7d5197aa0c44c01eb69d620N.exe 30 PID 484 wrote to memory of 2012 484 7d89d473d7d5197aa0c44c01eb69d620N.exe 30 PID 484 wrote to memory of 2012 484 7d89d473d7d5197aa0c44c01eb69d620N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exe"C:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exeC:\Users\Admin\AppData\Local\Temp\7d89d473d7d5197aa0c44c01eb69d620N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD54a195375d2f429461284ca392da7c583
SHA1d69f705af5ad8f49a95566054b8c1499e72f1246
SHA256c617649336daaf86d21aeef881ab1e990d9703b528f4de82d75d142d8d5a60a0
SHA512dff5a9795e37681da120c503ba20720ffa2c258c9c2889c793352c9373e717a93c68512549284f1c02749b88265edf8fc2b6b7b8b60877063f9ed8305b2374f2