Analysis
-
max time kernel
138s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe
Resource
win10v2004-20240802-en
General
-
Target
d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe
-
Size
1.3MB
-
MD5
f10813affba1b9db77cd760b0eef6d4c
-
SHA1
91554ee6bd40ab148d1efe3750f3aecd1e8375fb
-
SHA256
d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70
-
SHA512
2ba132bd4220054fb1ca37968ca183d2aa8786aecd35851fe691def3cb17a156fdb11e3d628d99f61bbf3a5a335f0f47687b3615ad182ae6502cdfc3feb06910
-
SSDEEP
24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8ar1olZy10/mtxbSmQCAe2:gTvC/MTQYxsWR7aRof4+mxVjA
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3288 set thread context of 4864 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe 4864 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4864 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 87 PID 3288 wrote to memory of 4864 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 87 PID 3288 wrote to memory of 4864 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 87 PID 3288 wrote to memory of 4864 3288 d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe"C:\Users\Admin\AppData\Local\Temp\d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\d2bc0b2bb67e8bbb593ca08d0cc70858d7feafcdacc210eef53442caafc1ca70.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5380ba0076624e277a3caf794ad6fc05e
SHA15c07763891c0d3eeb4b378d8ebf774719d917007
SHA256dee71a41261ea60a0292cad69ae455d1aca336ef92d3a549d9d7a44d5fb4e64d
SHA5123ed8bfa04bcfb7ce21c72cf5f6117e71ee5950f503678eee7c2392d45c0d227f22c8ffafc2f665669d71b832e0b0a545b74ff24a47d62a6b1fd7272ff62fb10a