Analysis
-
max time kernel
80s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
8f19cf66c2933b6f60f97835958fd640N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8f19cf66c2933b6f60f97835958fd640N.exe
Resource
win10v2004-20240802-en
General
-
Target
8f19cf66c2933b6f60f97835958fd640N.exe
-
Size
255KB
-
MD5
8f19cf66c2933b6f60f97835958fd640
-
SHA1
edce9368f3d5d5fba735873862d85e222f4da498
-
SHA256
570dbd9715e482779d911fc8d315775501cdbb02b7c5d075396e8cd94c874d1a
-
SHA512
02d48119083863f4159ce5619883b4fe1a6f514050aa5f9fee4a7b7fd904a42ae3baca612b3db7a990e9b611451e698899353e80bbc20627a895ed7f680cf5ae
-
SSDEEP
6144:AK1CLJDFKnsQBlFDS2h9l9mCcydrDxbvczg2870V:b1CLynsIlFGofcW99vkg287o
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 8f19cf66c2933b6f60f97835958fd640N.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 8f19cf66c2933b6f60f97835958fd640N.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 8f19cf66c2933b6f60f97835958fd640N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f19cf66c2933b6f60f97835958fd640N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 8f19cf66c2933b6f60f97835958fd640N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2564 8f19cf66c2933b6f60f97835958fd640N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2564 2384 8f19cf66c2933b6f60f97835958fd640N.exe 31 PID 2384 wrote to memory of 2564 2384 8f19cf66c2933b6f60f97835958fd640N.exe 31 PID 2384 wrote to memory of 2564 2384 8f19cf66c2933b6f60f97835958fd640N.exe 31 PID 2384 wrote to memory of 2564 2384 8f19cf66c2933b6f60f97835958fd640N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f19cf66c2933b6f60f97835958fd640N.exe"C:\Users\Admin\AppData\Local\Temp\8f19cf66c2933b6f60f97835958fd640N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\8f19cf66c2933b6f60f97835958fd640N.exeC:\Users\Admin\AppData\Local\Temp\8f19cf66c2933b6f60f97835958fd640N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5d0d91fa971995b5236e0ed4c3dbc3d1e
SHA10bd37818b11ade56964e1936a2d08833b4dc155e
SHA256e5004e110d4217884ae5a0352246219e85dfa8a2c3b2cc23dcc73f91dd26f0e0
SHA512916df56be3991b7a81c53a79b9071db69a158f209ec3f7e4532efe8f2332414201b77921df7372c304703231f961243353f643d3dc9f4706c5fda1993933b1d4