Analysis
-
max time kernel
82s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
3abccfd3a85f85888dcbc2836859d290N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3abccfd3a85f85888dcbc2836859d290N.exe
Resource
win10v2004-20240802-en
General
-
Target
3abccfd3a85f85888dcbc2836859d290N.exe
-
Size
5.0MB
-
MD5
3abccfd3a85f85888dcbc2836859d290
-
SHA1
75e8d70dc3f27adc32f34f346248bee7cb45f27d
-
SHA256
81f99c5b0327626eb7d5a5e804df898ae26229f9e5f4a0f42c374ee9f8387d63
-
SHA512
f47ae1ddd50d4c4ae29ad04777a7d14cdd78198bb9c1a2391da00ac187594432c1ee465c0b8964135b001268c614567232269e7a72a36e68f1312486e2292d10
-
SSDEEP
98304:W2igfeezuE4KFtaEkQQQAEXytvZi8eue8RQQW1SjPI5VZhQQAEXytvZi8eue8:W2igGgxFtaEkQpOfpPChpO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2520 3abccfd3a85f85888dcbc2836859d290N.exe -
Executes dropped EXE 1 IoCs
pid Process 2520 3abccfd3a85f85888dcbc2836859d290N.exe -
Loads dropped DLL 1 IoCs
pid Process 900 3abccfd3a85f85888dcbc2836859d290N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 5 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3abccfd3a85f85888dcbc2836859d290N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3abccfd3a85f85888dcbc2836859d290N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2520 3abccfd3a85f85888dcbc2836859d290N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 900 3abccfd3a85f85888dcbc2836859d290N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2520 3abccfd3a85f85888dcbc2836859d290N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 900 wrote to memory of 2520 900 3abccfd3a85f85888dcbc2836859d290N.exe 30 PID 900 wrote to memory of 2520 900 3abccfd3a85f85888dcbc2836859d290N.exe 30 PID 900 wrote to memory of 2520 900 3abccfd3a85f85888dcbc2836859d290N.exe 30 PID 900 wrote to memory of 2520 900 3abccfd3a85f85888dcbc2836859d290N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3abccfd3a85f85888dcbc2836859d290N.exe"C:\Users\Admin\AppData\Local\Temp\3abccfd3a85f85888dcbc2836859d290N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3abccfd3a85f85888dcbc2836859d290N.exeC:\Users\Admin\AppData\Local\Temp\3abccfd3a85f85888dcbc2836859d290N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5f7b7fd21a2499f52e0650e4cb94d8dce
SHA1dba95271c1e5542a5491cdd4626bf72fbf71ae6e
SHA256a42df64a43584e603d88d6e2fd2a50db69fdf08ebe13b3e23ad1d5d09730f268
SHA5124e3f5d505ca8e080109cb1ddb262abf79bd717383717829ebfb454cc93a214b9619a40908450df90c01b8d49c2b9bd639bd0559763723a3c0324b087384b1c33