Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
Resource
win10v2004-20240802-en
General
-
Target
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
-
Size
1.2MB
-
MD5
d4845c534c9b98fdef93172c373302cc
-
SHA1
4630b4e22439ef363ae367a7b4d01ce21047fe74
-
SHA256
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d
-
SHA512
1a3cbf9b43c993e71fb217e54b875127233d3341e607dc81f44cea409d243938ef4f101dbbe5a4e84a2d984a8d6da965f0fe5dcce8d04942cba658d6b5e04aae
-
SSDEEP
24576:6AHnh+eWsN3skA4RV1Hom2KXMmHar7LlU4oVmCBQ5o5:Nh+ZkldoPK8Yar7zoVmC7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3940 set thread context of 3464 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe 3464 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3464 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 86 PID 3940 wrote to memory of 3464 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 86 PID 3940 wrote to memory of 3464 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 86 PID 3940 wrote to memory of 3464 3940 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5f10ff08e15fbf9f3cc42286481092d42
SHA1111739e731ae9444e41813de99c33d5016bb865d
SHA25671baecf5a6e1e0f927238123c2d2b8adfcc2bf65f75bf7ed3b344994ea5b0c1c
SHA5122d882169b9eb8eb5bea4250a937c6bd6aa5b74db436856379567aa8197a5a138495a23ac082e04c0e11cf8173dc7e731547641dac5458a953902b4f2066f2ba3