Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
27f579efd17e1ed59129590d0f8118c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27f579efd17e1ed59129590d0f8118c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
27f579efd17e1ed59129590d0f8118c0N.exe
-
Size
235KB
-
MD5
27f579efd17e1ed59129590d0f8118c0
-
SHA1
2b440c469b0b8a52622ae2db80c1ef6cae4803ca
-
SHA256
6537a2328273ae7c6d3798cdc823c6140ca7aeda86e02ef9bfda7b26642144c7
-
SHA512
27634f264d2d957cada1a2da8548d084ac092c2b6458c8e6653e1742cdec443d1094f6a83a36bbc4d84c28113fb63165d42cf88186299658e44cc362b38d984a
-
SSDEEP
6144:EypbQT3Add11E5Eo5dJXLmfgMlAWCX79+1D:TbGHHjx+NlAWdD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1792 27f579efd17e1ed59129590d0f8118c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 1792 27f579efd17e1ed59129590d0f8118c0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2556 27f579efd17e1ed59129590d0f8118c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27f579efd17e1ed59129590d0f8118c0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2556 27f579efd17e1ed59129590d0f8118c0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1792 27f579efd17e1ed59129590d0f8118c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1792 2556 27f579efd17e1ed59129590d0f8118c0N.exe 31 PID 2556 wrote to memory of 1792 2556 27f579efd17e1ed59129590d0f8118c0N.exe 31 PID 2556 wrote to memory of 1792 2556 27f579efd17e1ed59129590d0f8118c0N.exe 31 PID 2556 wrote to memory of 1792 2556 27f579efd17e1ed59129590d0f8118c0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f579efd17e1ed59129590d0f8118c0N.exe"C:\Users\Admin\AppData\Local\Temp\27f579efd17e1ed59129590d0f8118c0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\27f579efd17e1ed59129590d0f8118c0N.exeC:\Users\Admin\AppData\Local\Temp\27f579efd17e1ed59129590d0f8118c0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD59fedc6768a9c344e01b91e878900a65b
SHA1017a1ae19af6556d62a2094f54752f18e796f099
SHA25666259b0a0eda401ae7740c705850ef1dd70a29da61c01edf0d9d083e13665212
SHA512bc37af883120a8555f13f32291a3a567a559289607dd8c26157cae50f2d757a6b166bb4375e6d3ce9302709a5e15063da7c0fa6cde321567746339bc827202cc