Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 04:28
Behavioral task
behavioral1
Sample
15b3fe3d254369c30daef4d9eb653660N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
15b3fe3d254369c30daef4d9eb653660N.exe
Resource
win10v2004-20240802-en
General
-
Target
15b3fe3d254369c30daef4d9eb653660N.exe
-
Size
335KB
-
MD5
15b3fe3d254369c30daef4d9eb653660
-
SHA1
9cd423fc975078eac8903eaa5e3d3d2f3c572653
-
SHA256
192fb7f15cc80e302427c2a227014cf83df77d587be6188a549755d1d8747861
-
SHA512
9bc6c4ca2b356e5697779e3eca7212aa08163262c3dd5b64395b8ce9222d9618b7732da5e7f7ed3991917932fc695a2a623512b7f21668c27eb6da234ad16a38
-
SSDEEP
6144:lkvY9W2QcboLKCwSuo0/WdjEXCNVDLNU3mxcK3PnXvBkyEXq:lkw9XbCwSuo0/EEXCNJprX6yEXq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
15b3fe3d254369c30daef4d9eb653660N.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15b3fe3d254369c30daef4d9eb653660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
15b3fe3d254369c30daef4d9eb653660N.exedescription pid process target process PID 2852 wrote to memory of 2620 2852 15b3fe3d254369c30daef4d9eb653660N.exe cmd.exe PID 2852 wrote to memory of 2620 2852 15b3fe3d254369c30daef4d9eb653660N.exe cmd.exe PID 2852 wrote to memory of 2620 2852 15b3fe3d254369c30daef4d9eb653660N.exe cmd.exe PID 2852 wrote to memory of 2620 2852 15b3fe3d254369c30daef4d9eb653660N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b3fe3d254369c30daef4d9eb653660N.exe"C:\Users\Admin\AppData\Local\Temp\15b3fe3d254369c30daef4d9eb653660N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:2620
-