Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 02:26
Behavioral task
behavioral1
Sample
1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe
Resource
win10v2004-20240802-en
General
-
Target
1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe
-
Size
8.2MB
-
MD5
ce36529e85d4ec7aab8401024df9c8a4
-
SHA1
587870c34208deff867054b1af117e459b41b2a6
-
SHA256
1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867
-
SHA512
41d90bc07724641a257273963b7980601bf786377cd8d20629904c2b41e334eb38ca50a66887f22042764804210b2c09e478c06021f154f1be582448a36ed8ed
-
SSDEEP
196608:jgzWQHiSUYulNfUv+wq4GAwPgTg0vVicIE5nR0U3:jgKi0XleG9Yi0vgcRRT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1664 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 1664 2772 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe 31 PID 2772 wrote to memory of 1664 2772 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe 31 PID 2772 wrote to memory of 1664 2772 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe 31 PID 2772 wrote to memory of 1664 2772 1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe"C:\Users\Admin\AppData\Local\Temp\1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe"C:\Users\Admin\AppData\Local\Temp\1f50cf2d20dfb8861c656523fe8db061c4ffab353e1ee016ffab32a37f5ee867.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5640ec0b1fc4812bc3c2091da1f409592
SHA1ce7624cae17a94663509df0723e3efce173489aa
SHA25623a474eab298df93923ecac33007e547cc35d1a718310df4fc9a24025ad2176f
SHA5126a6706e3f2b93cf41d8312c092a3b80cec33aef372fc2183be867aff6167cce2af64b65dabf28e7ca66435ad6555ef2b690cd2d6005a6c827bc986dff3896ce4