Analysis
-
max time kernel
90s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
f97c8f5a8fe3c6eb5ecc580e90e22250N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f97c8f5a8fe3c6eb5ecc580e90e22250N.exe
Resource
win10v2004-20240802-en
General
-
Target
f97c8f5a8fe3c6eb5ecc580e90e22250N.exe
-
Size
2.1MB
-
MD5
f97c8f5a8fe3c6eb5ecc580e90e22250
-
SHA1
f22a95d9d336b59cbf5a195bc95bab6e09f17ded
-
SHA256
375e9b2d95623dbbdea44bb55a54e689f4412769ea6b709b0a71a963760c0b05
-
SHA512
e9f1d80a7b7faced723810c569909d211bc62c43f57d7a74a65d58f4ca686bb571a53b9c864cc39a26e8cf2f226a08fd5b2d487f75fe9846890d305a509cee9d
-
SSDEEP
49152:ZL4PLgVU7Jad3EEGbl+gOFtaEkQbExL5IOwzC8NDXy/FBhZIFUe8eueq:ZU0VU92jYqFtaEkQQQAEXytvZi8eueq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Loads dropped DLL 1 IoCs
pid Process 2464 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f97c8f5a8fe3c6eb5ecc580e90e22250N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2464 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2756 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2756 2464 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe 31 PID 2464 wrote to memory of 2756 2464 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe 31 PID 2464 wrote to memory of 2756 2464 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe 31 PID 2464 wrote to memory of 2756 2464 f97c8f5a8fe3c6eb5ecc580e90e22250N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97c8f5a8fe3c6eb5ecc580e90e22250N.exe"C:\Users\Admin\AppData\Local\Temp\f97c8f5a8fe3c6eb5ecc580e90e22250N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\f97c8f5a8fe3c6eb5ecc580e90e22250N.exeC:\Users\Admin\AppData\Local\Temp\f97c8f5a8fe3c6eb5ecc580e90e22250N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD584a461a1b268e7310b9d56fdfa68a83e
SHA1963b75a6bfcdbda6f088955664d2083f2c459bc3
SHA2568d8c3fec0be749e7c24671d466376698bf4e0d7fba87183bc89289d4b2e2b043
SHA512dca1ec1b3fb5137f9e2d6616e88deb8e5fceadf9374ecb9cb0eb80f9b6124f6085cceeed5a67e0c25ff1275b37d6a73ce0cacc507307ff13497b434c78a1d08e