Analysis
-
max time kernel
101s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
cd4e4b00c31293aae2be359f113eba20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cd4e4b00c31293aae2be359f113eba20N.exe
Resource
win10v2004-20240802-en
General
-
Target
cd4e4b00c31293aae2be359f113eba20N.exe
-
Size
34KB
-
MD5
cd4e4b00c31293aae2be359f113eba20
-
SHA1
e866ae528b057332b430c66d9a824aa3fd32bfea
-
SHA256
d4d34133c54f58b3ce7bf0e0d680849483f6c94dce8b71758557d1eca7542f89
-
SHA512
3ecf4ce6fe8947e1bddc041054606b0c53dcdef3184015468db7fb88c2ff38a4ed57573d23004f965b426819738c061c065c7212daf2ce96ec6864fab2b5ec2d
-
SSDEEP
768:6eeI2//kFi7tCV6rtfZYjBUfyL4Mk9WBNvnFRtD5n:622nkFi7thRfZYtUfyL4Mk9WBNXt1n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 ofadebux.exe -
Loads dropped DLL 1 IoCs
pid Process 2564 cd4e4b00c31293aae2be359f113eba20N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd4e4b00c31293aae2be359f113eba20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ofadebux.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2712 2564 cd4e4b00c31293aae2be359f113eba20N.exe 29 PID 2564 wrote to memory of 2712 2564 cd4e4b00c31293aae2be359f113eba20N.exe 29 PID 2564 wrote to memory of 2712 2564 cd4e4b00c31293aae2be359f113eba20N.exe 29 PID 2564 wrote to memory of 2712 2564 cd4e4b00c31293aae2be359f113eba20N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd4e4b00c31293aae2be359f113eba20N.exe"C:\Users\Admin\AppData\Local\Temp\cd4e4b00c31293aae2be359f113eba20N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\ofadebux.exeC:\Users\Admin\AppData\Local\Temp\ofadebux.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD56335cee1bb64fae6c56b9c554658b399
SHA1d6c387de9c0dcd7d6fd48da3459ed730e965759c
SHA2567f7e6e5834a6640d7610771f90deed289a8c1e72e4f9250345487e385bac93da
SHA512183e42bd16d292226c8235d295a2eda6e764ab7b8849b53fe07ffd3d449b41943060f4c7c91d4e59451985df988311cdf8f94c0e6a47a8120941e01443413134