Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe
Resource
win10v2004-20240802-en
General
-
Target
e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe
-
Size
640KB
-
MD5
e2cbbbeac3e3fbf04444d57b8c8a8c10
-
SHA1
9f38030473cbf752842af9b06bef3c2b8a3d01ac
-
SHA256
c06b01cfd3f0434e5f28cc85c2cc6892e1a5902018342bba1c87110dd4887997
-
SHA512
dfd8e0bd1b7c74dd295c67f08f4e2fc62d929d7d37cf3c7ea063e57f9211a2f8e5984cb64e91d010ddbcd980d67130d7df71ceda044016bb88bf1ada4b51d02b
-
SSDEEP
12288:5NzTInlbDeWhVQ5zCD4TyWN9VysX7ryTk2osi9:5NzTIlXeWhVQ5zY4xN9VyUUkV19
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 372 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe -
Executes dropped EXE 1 IoCs
pid Process 372 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 372 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 372 2192 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe 31 PID 2192 wrote to memory of 372 2192 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe 31 PID 2192 wrote to memory of 372 2192 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe 31 PID 2192 wrote to memory of 372 2192 e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe"C:\Users\Admin\AppData\Local\Temp\e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\e2cbbbeac3e3fbf04444d57b8c8a8c10N.exeC:\Users\Admin\AppData\Local\Temp\e2cbbbeac3e3fbf04444d57b8c8a8c10N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5efef5ce3ead00017fb004a3ee50f31aa
SHA15e63ebf8c19c6da330256f94a1b546c711d0912d
SHA2565ed03dcff2b6760c5d1825ae72068a3ca5d581c09678f07639e5ec218635b0cc
SHA5128d3705f85edcec422dc530fe7b3f89b46185aa5dca7c73b3e4c3bc05839c83f7d220176c8f49b44f13f7785d5605def57672e44d480f888bc537a55de989ed69