Analysis
-
max time kernel
10s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
4d9d4705d943f69e70ceae2b83c643c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d9d4705d943f69e70ceae2b83c643c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
4d9d4705d943f69e70ceae2b83c643c0N.exe
-
Size
448KB
-
MD5
4d9d4705d943f69e70ceae2b83c643c0
-
SHA1
78cf04c90e60d01b2720aa08b63fbc6d7964b703
-
SHA256
52c15fa91d8c594a714ec42739549e8e159d30a39be47c2f47a10ad027bbeec6
-
SHA512
02ac96341e15d0e6a2da749f07f3832f0980a999714df78286fede5a11f0c76d440c8a8daf0b4f3844a444af57dd60e9f9adc23ab9a374624be0f2b3fa3b7a9a
-
SSDEEP
6144:3sBXDK3jWZ9DSnR+731eWTavE3KI4UWhV40saiigCD4H2cHwXWNzDw:3sV+3qTleURZPWhVQ5zCD4TyWN4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2164 4d9d4705d943f69e70ceae2b83c643c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2164 4d9d4705d943f69e70ceae2b83c643c0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2884 4d9d4705d943f69e70ceae2b83c643c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d9d4705d943f69e70ceae2b83c643c0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2884 4d9d4705d943f69e70ceae2b83c643c0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2164 4d9d4705d943f69e70ceae2b83c643c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2164 2884 4d9d4705d943f69e70ceae2b83c643c0N.exe 30 PID 2884 wrote to memory of 2164 2884 4d9d4705d943f69e70ceae2b83c643c0N.exe 30 PID 2884 wrote to memory of 2164 2884 4d9d4705d943f69e70ceae2b83c643c0N.exe 30 PID 2884 wrote to memory of 2164 2884 4d9d4705d943f69e70ceae2b83c643c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9d4705d943f69e70ceae2b83c643c0N.exe"C:\Users\Admin\AppData\Local\Temp\4d9d4705d943f69e70ceae2b83c643c0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\4d9d4705d943f69e70ceae2b83c643c0N.exeC:\Users\Admin\AppData\Local\Temp\4d9d4705d943f69e70ceae2b83c643c0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5f9c41a052a1cf5db7d88b2c87ab9ba62
SHA1e73fbe6c2729cbc95984cda04a83622b0f087544
SHA256aff56c7e0852283be0f58411445a8a0067318a4c99b22db24ef6505fa9886112
SHA512cf74864a8adeacfc9e9cdb90a07901c3d407494c1a846c460a5730807706cf5e0b0558282d2dfe3af03bdb151c860e6dec2d54419b83a728f3b05b181f0b1cf3