Analysis
-
max time kernel
111s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 21:55
Behavioral task
behavioral1
Sample
d3b57c60c3df60583be7db4c64f63ea0N.exe
Resource
win7-20240704-en
General
-
Target
d3b57c60c3df60583be7db4c64f63ea0N.exe
-
Size
206KB
-
MD5
d3b57c60c3df60583be7db4c64f63ea0
-
SHA1
bea47defa14136208bae5d4d6d49a6628d0e8d3d
-
SHA256
3db2bf8aadcc47dc9830396a07bc896634ab6028f222404438f8fcd2ff582103
-
SHA512
6bf5518c0ac06d4108a99973604ec82edaf9b654cb62d23d57014dbf4ac5312f4a97e6e81d3a9e3753e48a84b1a2cf9cc2592d239eaf69102021badff4db3194
-
SSDEEP
6144:WDbJX4alg8npg9tY72QraPF5ubz7T5l2wYNL9fw:EXPlNna3Q2QKQz7N3cL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 American.exe -
Loads dropped DLL 2 IoCs
pid Process 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe -
resource yara_rule behavioral1/memory/1140-0-0x0000000000400000-0x0000000000578000-memory.dmp upx behavioral1/files/0x0009000000018f82-2.dat upx behavioral1/memory/2568-10-0x0000000000400000-0x0000000000578000-memory.dmp upx behavioral1/memory/1140-12-0x0000000000400000-0x0000000000578000-memory.dmp upx behavioral1/memory/2568-13-0x0000000000400000-0x0000000000578000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\English\American.exe d3b57c60c3df60583be7db4c64f63ea0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3b57c60c3df60583be7db4c64f63ea0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language American.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 2568 American.exe 2568 American.exe 2568 American.exe 2568 American.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2568 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 30 PID 1140 wrote to memory of 2568 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 30 PID 1140 wrote to memory of 2568 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 30 PID 1140 wrote to memory of 2568 1140 d3b57c60c3df60583be7db4c64f63ea0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3b57c60c3df60583be7db4c64f63ea0N.exe"C:\Users\Admin\AppData\Local\Temp\d3b57c60c3df60583be7db4c64f63ea0N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files\English\American.exe"C:\Program Files\English\American.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD546ed5c731fa3e51a12ed3c87019ce63e
SHA1ad8950dcd61b2a77ff206caa9edea3011cca0a16
SHA256daa758942da418aa9a4c1ad9f1664172d141efca179842c2c5396b98ea7c7a18
SHA51242236705c4e27e00b0aa084289a511417b954d6fd8723bdc8a85a7a3c61c2f93292e228c4d94c0cfa26a6d5f6dafe45762ac178f40ec1cca85c95da95464e84a