Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
PI CT1022.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PI CT1022.exe
Resource
win10v2004-20240802-en
General
-
Target
PI CT1022.exe
-
Size
1.2MB
-
MD5
63dc152f2d5adcf904ff061c4a23a8c6
-
SHA1
41b4fcb69b736e683ccef9cb355711b7b08d8ddc
-
SHA256
9244f2b8ccdc1ed4270a282ccbd1c47723621dd508889e224806884a98737c70
-
SHA512
1f0566aa56c0a01a11a9d924e6a4ce0bfdb204169683f9c110008d321f2b157a59287fc4954031c9fdba57c22a7998111eeaddc8ebb2f0292b7f8fed2fc7f06d
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHarwMnTPhh7Cp2DVWUoCU12XK5:2h+ZkldoPK8Yar7nTphFDVWUoR2Q
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3604 set thread context of 244 3604 PI CT1022.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PI CT1022.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe 244 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3604 PI CT1022.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3604 PI CT1022.exe 3604 PI CT1022.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3604 PI CT1022.exe 3604 PI CT1022.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3604 wrote to memory of 244 3604 PI CT1022.exe 87 PID 3604 wrote to memory of 244 3604 PI CT1022.exe 87 PID 3604 wrote to memory of 244 3604 PI CT1022.exe 87 PID 3604 wrote to memory of 244 3604 PI CT1022.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\PI CT1022.exe"C:\Users\Admin\AppData\Local\Temp\PI CT1022.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PI CT1022.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5214bce4270b30b6bd9ad6a2910b33444
SHA1028afbab93055325ab10d4b098da8dce0830ced3
SHA2567b3f3a9ea60f861077949e5ca4bc74cab133ee6c5b56ff724a2fffa7c9fe367b
SHA5121ed975a7a9836964316443a8574ffca717a15407256f517d193020a7fbb504a5571948c7875b8ef0820de51d2a702613519f1452475e981d986bc6bfb9d39d4f