Analysis
-
max time kernel
101s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe
Resource
win10v2004-20240802-en
General
-
Target
43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe
-
Size
4.2MB
-
MD5
43bd88cb4e6c6aeaa8a6bd73d9e0f830
-
SHA1
7480d1e7662d1d979895e1e043fc0f419a0d29c5
-
SHA256
7fc93f874751d474edb03be0912d574a5fb53092f5b8504052861fde4a10573a
-
SHA512
841d3156783ab04d989628b6eefe19af6773eeb3d966b07ef69bef05781d63f09e91ae6954474a138bc0947f784eb5902a31f3ee86cac4ce777a9cd65d3b5498
-
SSDEEP
98304:Cmhd1UryegwMHwab4PErS8qVLUjH5oxFbxhVLUjH5oxFbx:ClzYDSTVUjZEdhVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2184 7ED5.tmp -
Executes dropped EXE 1 IoCs
pid Process 2184 7ED5.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ED5.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2184 4032 43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe 86 PID 4032 wrote to memory of 2184 4032 43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe 86 PID 4032 wrote to memory of 2184 4032 43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe"C:\Users\Admin\AppData\Local\Temp\43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"C:\Users\Admin\AppData\Local\Temp\7ED5.tmp" --splashC:\Users\Admin\AppData\Local\Temp\43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe C3D7437D2C50A3E22DF30084EBA7B6820DC9631389D122326B9F73DF2DD5295DF98404AC65CB7BAEF90B226173DBAF19D2387F0A2C4896D58544BE75CDD4CE2A2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD571ab0fe3bb4084e40caf8c3b9112ef54
SHA15f22cbd513011842734e3e01e6c7f21e13a77553
SHA2561c9801be9bf0f5ad6d71f8e35fa27142bf3654952bf77eb3ae8881f9ca4a9062
SHA512f8e7a31fd300ece7237de0ed93f373e6ad6df88da8390647b09552ce6ec2e0721acc81cebfca6ba8c47616f08a42bfec3b841d1f7ffd8e03d4b9209807230d3c