Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
견적요청.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
견적요청.exe
Resource
win10v2004-20240802-en
General
-
Target
견적요청.exe
-
Size
1.2MB
-
MD5
62c682d1e40d48785b0195c3838d3f8b
-
SHA1
d7eb773664bbe139b87bc8b88b14d91de84eb946
-
SHA256
cf41abb4bc21de6394a69c3543fa9a967176f2ee0ead85f828b57f584a757c41
-
SHA512
a1ed314718b7032ea25485d9f53ca58ae3e4ff5c4e3ce471b85f35dea1666fa3f9e1280d32f0b90ca70585fdd9058921b6e3e8836edafad6a12d32797e511e91
-
SSDEEP
24576:yAHnh+eWsN3skA4RV1Hom2KXMmHaoC2JTT/mEZztMEHBI5:1h+ZkldoPK8YaoC2JTTOEtt8
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3500 set thread context of 3568 3500 견적요청.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 견적요청.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3500 견적요청.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3500 견적요청.exe 3500 견적요청.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3500 견적요청.exe 3500 견적요청.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3568 3500 견적요청.exe 87 PID 3500 wrote to memory of 3568 3500 견적요청.exe 87 PID 3500 wrote to memory of 3568 3500 견적요청.exe 87 PID 3500 wrote to memory of 3568 3500 견적요청.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\견적요청.exe"C:\Users\Admin\AppData\Local\Temp\견적요청.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\견적요청.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD54b12e4fdaa4ca9e3d579bca084faa4df
SHA11bc9438b098124c3fecf120861df2862812c5aff
SHA256aab1f211dfa00014bd1679b09672fffd4dcaa15f337b39d470db04897d05b329
SHA512ce9a8eb8c890a79fcec94b551615974c8b463dfeffcf18f2bbf27b75ef151ff2c7483f448b5db546c0a8b466b0c29285613365782be1736fbdb6834974b4ce5a