Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
4536c613560f5c69d63b2a09cb69a410N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4536c613560f5c69d63b2a09cb69a410N.exe
Resource
win10v2004-20240802-en
General
-
Target
4536c613560f5c69d63b2a09cb69a410N.exe
-
Size
1.1MB
-
MD5
4536c613560f5c69d63b2a09cb69a410
-
SHA1
fd212fb49a228be464a126f82d1c25dd07868fe8
-
SHA256
227472e07d4ed9f784f58cf58a79e8b6f300dd45e0be93a77a372abc2a78c7d2
-
SHA512
e2ed808a56d6c957edfa4844f2327c37bd4f5ab0674c31a679be828827a3178a509d1b48610c84061c3c939d17d4f2e8b704f31670ebb9ba8be65e39325a4f89
-
SSDEEP
24576:REyVdiMjglOD1USbea/ZSoa/JXekh77Lv+fh:RZVvjgloegTg4khb+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 4536c613560f5c69d63b2a09cb69a410N.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 4536c613560f5c69d63b2a09cb69a410N.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 4536c613560f5c69d63b2a09cb69a410N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4536c613560f5c69d63b2a09cb69a410N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4536c613560f5c69d63b2a09cb69a410N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2676 4536c613560f5c69d63b2a09cb69a410N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2520 4536c613560f5c69d63b2a09cb69a410N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2676 4536c613560f5c69d63b2a09cb69a410N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2676 2520 4536c613560f5c69d63b2a09cb69a410N.exe 31 PID 2520 wrote to memory of 2676 2520 4536c613560f5c69d63b2a09cb69a410N.exe 31 PID 2520 wrote to memory of 2676 2520 4536c613560f5c69d63b2a09cb69a410N.exe 31 PID 2520 wrote to memory of 2676 2520 4536c613560f5c69d63b2a09cb69a410N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe"C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exeC:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5bbd4f951c9a5dc1b438ab4fcb788df35
SHA108d3075fb3e2d504648745077768b3e608b99358
SHA256f5efdfd9fdd02010d4842a9e9dbb683cf89f37fc7328e049f21cdc9d9660d9cf
SHA5128d5cc0e858a49befe0815f80b34b9203488295557bc758924b045d6dffa6ac745542175b8a1a36e1bae541b2e098b81815a1b807cd84cb1c8a18676e49057d3b