Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
6a63236f30f5f55da33f9cd17d87bd80N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6a63236f30f5f55da33f9cd17d87bd80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a63236f30f5f55da33f9cd17d87bd80N.exe
-
Size
37KB
-
MD5
6a63236f30f5f55da33f9cd17d87bd80
-
SHA1
1afaa7a17ae9bc748a0451904d5c07d36e45e0d8
-
SHA256
52e4b60f570325eacd92d6c7b1be9c61d5d9163211051db18384ac185eedc51f
-
SHA512
5f3ea27e93eedb0182e88b5a1296bb1b3a959648b5710f0e476a3010dd219aa203435e048d659b0a812a2949162410b8f9d1bf500047515c56a91d9c78f389a3
-
SSDEEP
384:8ymGIDl8anPvH4kyAP3VPmVUj42pOFCyoeTemVz06pRrLXCAlc8cw1A3dGKHWTb:8ymKUPvYePEUj4+OEWxDqn5HU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 codec_update.exe -
Loads dropped DLL 4 IoCs
pid Process 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 1516 codec_update.exe 1516 codec_update.exe 1516 codec_update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a63236f30f5f55da33f9cd17d87bd80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language codec_update.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31 PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31 PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31 PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31 PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31 PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31 PID 1384 wrote to memory of 1516 1384 6a63236f30f5f55da33f9cd17d87bd80N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a63236f30f5f55da33f9cd17d87bd80N.exe"C:\Users\Admin\AppData\Local\Temp\6a63236f30f5f55da33f9cd17d87bd80N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\codec_update.exe"C:\Users\Admin\AppData\Local\Temp\codec_update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5ca7515afaedeb487857b431719a23fa9
SHA160bf631f519238cb5d7a37b2beb6742fcae022b4
SHA2561581886ecc62a5421f22402da8954c5149f5279c435b8514c38b6d339e20949a
SHA5120a2c157482d267bd2c49e10320aaa4b7acbf84f01b5df80db6d8db9fd4720620651d9bdf094a45fd4e13782ebf0255d106477863a63ed7c28243589068edaf3d