Analysis
-
max time kernel
63s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
Resource
win10v2004-20240802-en
General
-
Target
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
-
Size
1.2MB
-
MD5
d4845c534c9b98fdef93172c373302cc
-
SHA1
4630b4e22439ef363ae367a7b4d01ce21047fe74
-
SHA256
9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d
-
SHA512
1a3cbf9b43c993e71fb217e54b875127233d3341e607dc81f44cea409d243938ef4f101dbbe5a4e84a2d984a8d6da965f0fe5dcce8d04942cba658d6b5e04aae
-
SSDEEP
24576:6AHnh+eWsN3skA4RV1Hom2KXMmHar7LlU4oVmCBQ5o5:Nh+ZkldoPK8Yar7zoVmC7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 2116 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2116 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 28 PID 2488 wrote to memory of 2116 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 28 PID 2488 wrote to memory of 2116 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 28 PID 2488 wrote to memory of 2116 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 28 PID 2488 wrote to memory of 2116 2488 9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5f10ff08e15fbf9f3cc42286481092d42
SHA1111739e731ae9444e41813de99c33d5016bb865d
SHA25671baecf5a6e1e0f927238123c2d2b8adfcc2bf65f75bf7ed3b344994ea5b0c1c
SHA5122d882169b9eb8eb5bea4250a937c6bd6aa5b74db436856379567aa8197a5a138495a23ac082e04c0e11cf8173dc7e731547641dac5458a953902b4f2066f2ba3