Analysis
-
max time kernel
110s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 00:17
Behavioral task
behavioral1
Sample
1eee405aaf8a9f59ea29cf3323dd1990N.exe
Resource
win7-20240708-en
General
-
Target
1eee405aaf8a9f59ea29cf3323dd1990N.exe
-
Size
59KB
-
MD5
1eee405aaf8a9f59ea29cf3323dd1990
-
SHA1
a26883ceff8c33bcdf9cf657bf6e5b720d1cbe7e
-
SHA256
ef2e70d4cb5536815bd7a57767e0bedf4054b46720e786eed52eac7d966e3aed
-
SHA512
318dfe63bef08c5c5d76d697af302094f21a6c893692b52fe6477e23dd683b96e4c7599a2b9c37ca5ba74ccae329dfd6702425052472f8e1b808d5e708fa2791
-
SSDEEP
1536:LuLeux3e/YjFyCgcrZJeXiCxjxQ5JflLXp3dw0Pxz:SFO8teiCEJtLXZdwA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5016 1eee405aaf8a9f59ea29cf3323dd1990N.exe -
Executes dropped EXE 1 IoCs
pid Process 5016 1eee405aaf8a9f59ea29cf3323dd1990N.exe -
resource yara_rule behavioral2/memory/4552-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x00090000000234a8-11.dat upx behavioral2/memory/5016-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1eee405aaf8a9f59ea29cf3323dd1990N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4552 1eee405aaf8a9f59ea29cf3323dd1990N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4552 1eee405aaf8a9f59ea29cf3323dd1990N.exe 5016 1eee405aaf8a9f59ea29cf3323dd1990N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 5016 4552 1eee405aaf8a9f59ea29cf3323dd1990N.exe 85 PID 4552 wrote to memory of 5016 4552 1eee405aaf8a9f59ea29cf3323dd1990N.exe 85 PID 4552 wrote to memory of 5016 4552 1eee405aaf8a9f59ea29cf3323dd1990N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eee405aaf8a9f59ea29cf3323dd1990N.exe"C:\Users\Admin\AppData\Local\Temp\1eee405aaf8a9f59ea29cf3323dd1990N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\1eee405aaf8a9f59ea29cf3323dd1990N.exeC:\Users\Admin\AppData\Local\Temp\1eee405aaf8a9f59ea29cf3323dd1990N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52f16343fbb2414144583e0249ea2ddb8
SHA116cec2cdcf5e06c601b92ac2fe8f76265ed37db6
SHA2560d73f0570e4da948fe84214a247c2389789f9c1cd4d18adecbe7cae82f272a15
SHA51292ddca762322188ea4f0c831e741673b62a1bbd2c4c05dade19fa8e6cd3f4017f609806d0633d483cea2a902dc35a98ba9f9bfa6b82b0a7319cc27df145c8074