Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
8de05004e93ab9fa2a3d0ab84fb6bf50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8de05004e93ab9fa2a3d0ab84fb6bf50N.exe
Resource
win10v2004-20240802-en
General
-
Target
8de05004e93ab9fa2a3d0ab84fb6bf50N.exe
-
Size
192KB
-
MD5
8de05004e93ab9fa2a3d0ab84fb6bf50
-
SHA1
f7a2deac072d3acc1037126d029273c4dbefc1c3
-
SHA256
b1adda898ec292abaab006866c499fc06e7dd737c53145323133343f34940778
-
SHA512
8e61331513cf7e4f4652f28ede37163c4036f7bc1873e082787be6f285d8b2cf5761d686f58932ad19233ded125c6743ec451961410d7f0ce89b2d21e0c01a19
-
SSDEEP
3072:2Gb1+adM+Bl7g1VjUa0uN+NKvHuPbvjmfyabPdAtoOQyaw9nDTwO7:1h+aGE8hUa0uNVa7mfNPc1T9nHw2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2280 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2280 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2280 2392 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe 31 PID 2392 wrote to memory of 2280 2392 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe 31 PID 2392 wrote to memory of 2280 2392 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe 31 PID 2392 wrote to memory of 2280 2392 8de05004e93ab9fa2a3d0ab84fb6bf50N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8de05004e93ab9fa2a3d0ab84fb6bf50N.exe"C:\Users\Admin\AppData\Local\Temp\8de05004e93ab9fa2a3d0ab84fb6bf50N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\8de05004e93ab9fa2a3d0ab84fb6bf50N.exeC:\Users\Admin\AppData\Local\Temp\8de05004e93ab9fa2a3d0ab84fb6bf50N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5f63d52619a1187d4336db0cdd2639696
SHA12ed15d812cad6a7d43bceef0f72ceb6453eb0c8e
SHA256d381c7da5126497e492d24eddc84f212778023b497f3e34f9728c7e6d3055f7c
SHA512897efccd35b15b89a0d993904d12a7f3d140f1713a935b3398f9c93d60ddb28f20a0fd6c4a48d6284347a3e600d69aceacf9ea2f2f534a0d9bc1c0d76184a88d