Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
f7e91871b8b95a333b4663a348bedeb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7e91871b8b95a333b4663a348bedeb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f7e91871b8b95a333b4663a348bedeb0N.exe
-
Size
209KB
-
MD5
f7e91871b8b95a333b4663a348bedeb0
-
SHA1
cb7978c5e8af1d887a5735f7cd2c11c689785a84
-
SHA256
ce80de26cdd2e615aae170d6baedd96053d1f4506e7b02a3e439b3d1a530cef5
-
SHA512
5952c69ca86d537c8fe5a87d2d79da60812f263404a01f5afc1ea05639c0079e5555e29a89a4120fd5e44c5a82cb754820fc774ef5d0bf052e0ae5f4eb637ec0
-
SSDEEP
3072:5KWXbaM34c5m76AZuTLuAaO0fWPtErqdSSjN37ko+GWpgmoCuWefXZV+s:5nXbp34aAMkO0fvyjBAo+GIgmotfXp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2012 f7e91871b8b95a333b4663a348bedeb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 f7e91871b8b95a333b4663a348bedeb0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 f7e91871b8b95a333b4663a348bedeb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7e91871b8b95a333b4663a348bedeb0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 f7e91871b8b95a333b4663a348bedeb0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2012 f7e91871b8b95a333b4663a348bedeb0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2012 2228 f7e91871b8b95a333b4663a348bedeb0N.exe 31 PID 2228 wrote to memory of 2012 2228 f7e91871b8b95a333b4663a348bedeb0N.exe 31 PID 2228 wrote to memory of 2012 2228 f7e91871b8b95a333b4663a348bedeb0N.exe 31 PID 2228 wrote to memory of 2012 2228 f7e91871b8b95a333b4663a348bedeb0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exe"C:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exeC:\Users\Admin\AppData\Local\Temp\f7e91871b8b95a333b4663a348bedeb0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53f265d772a0f62856c72af7eeb489415
SHA10a41cda97a69c04b55c61f55e179d2a46b00e412
SHA2563aa3e9c1eda49db3134067a890e7f6ce6a6a8d84354192fca97d89648d1480e5
SHA51207ff4821d406346fc11869d065f8af038a454fe98c98a2700bd3b1708388ef7c7bc7213695ddf58d25c54fea140a4d325ad141b42744e574f9d65441f5731567