Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
ae27e35451b92634ed18ace0ca6cfeb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae27e35451b92634ed18ace0ca6cfeb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ae27e35451b92634ed18ace0ca6cfeb0N.exe
-
Size
272KB
-
MD5
ae27e35451b92634ed18ace0ca6cfeb0
-
SHA1
eea7849cbf0d585dfe097d8d300fd136fbf3c4f3
-
SHA256
987a2c4857b6ebe2a3879deef6a0a902c2e87f1bd5b4a8ef58c9c4ec56447d52
-
SHA512
e3290415b5b2da93385fdebda52b2a3bc111ce1012498699d46114b97f9436a87102a8fda03f5bf6fd93de7ab6b9238984287ab58dd0e517e0e0a0c83aef5b9a
-
SSDEEP
6144:h6vCh86RFfkNIC0RJ1GPf801cdvt9AhSXpPmv51pX4v6V40saiZ:h66h86R2NICu2gBm26VQ5Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2476 ae27e35451b92634ed18ace0ca6cfeb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 ae27e35451b92634ed18ace0ca6cfeb0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2628 ae27e35451b92634ed18ace0ca6cfeb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae27e35451b92634ed18ace0ca6cfeb0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2628 ae27e35451b92634ed18ace0ca6cfeb0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2476 ae27e35451b92634ed18ace0ca6cfeb0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2476 2628 ae27e35451b92634ed18ace0ca6cfeb0N.exe 32 PID 2628 wrote to memory of 2476 2628 ae27e35451b92634ed18ace0ca6cfeb0N.exe 32 PID 2628 wrote to memory of 2476 2628 ae27e35451b92634ed18ace0ca6cfeb0N.exe 32 PID 2628 wrote to memory of 2476 2628 ae27e35451b92634ed18ace0ca6cfeb0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae27e35451b92634ed18ace0ca6cfeb0N.exe"C:\Users\Admin\AppData\Local\Temp\ae27e35451b92634ed18ace0ca6cfeb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\ae27e35451b92634ed18ace0ca6cfeb0N.exeC:\Users\Admin\AppData\Local\Temp\ae27e35451b92634ed18ace0ca6cfeb0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5eecb15596bb5bee2ec3b59dbcb8476e6
SHA12f2ad54f794396064c7aeb380ae3756d1c93a33f
SHA2568d7cbdd6aba45f52c98cecad2fc9ccb882ee946cea35531e94a5d6a447eb88f7
SHA512da49debefb3a3c980751b21be8a4ee0449030b28a3b6347e9afbc5fa9259662171d975ac6b77ffd7bc4b3588ff866cea9390c47daf8d32d0390752594864bfab