Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
315aee617983b64ac6b5d31874fa5eb0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
315aee617983b64ac6b5d31874fa5eb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
315aee617983b64ac6b5d31874fa5eb0N.exe
-
Size
1.4MB
-
MD5
315aee617983b64ac6b5d31874fa5eb0
-
SHA1
485de6a81636079a878f5220bd276b5ebaf39676
-
SHA256
721665ad995139e33398aab93ef21263694171387c41f024b49bc677a330f2fb
-
SHA512
dacd58ba8c75aaa116039cce0ff808af31eba442db8f79fdededfc79970c30121afb0bffc3bfb8274c5b4c26e545dc150875e1e93df2f135b25e735b7fce8554
-
SSDEEP
24576:Tax/PfhELIP50nguWxLZmN1DUZmSordfq6Ph2kkkkK4kXkkkkkkkkhLX3ax:Tax/P5ELE0ngb9ZmXYZmSadfqkbax
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2776 E81E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2776 E81E.tmp -
Loads dropped DLL 1 IoCs
pid Process 2708 315aee617983b64ac6b5d31874fa5eb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315aee617983b64ac6b5d31874fa5eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E81E.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2776 2708 315aee617983b64ac6b5d31874fa5eb0N.exe 31 PID 2708 wrote to memory of 2776 2708 315aee617983b64ac6b5d31874fa5eb0N.exe 31 PID 2708 wrote to memory of 2776 2708 315aee617983b64ac6b5d31874fa5eb0N.exe 31 PID 2708 wrote to memory of 2776 2708 315aee617983b64ac6b5d31874fa5eb0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\315aee617983b64ac6b5d31874fa5eb0N.exe"C:\Users\Admin\AppData\Local\Temp\315aee617983b64ac6b5d31874fa5eb0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\E81E.tmp"C:\Users\Admin\AppData\Local\Temp\E81E.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD570796a0d0a9d12ec3d413856c93af1cc
SHA1e81a018759aea0469b9661c374bcbbcda22a5565
SHA256d5b33a464d50b00cc6f80649f33c7b8f2cde8d134cd6411927d5f4f3bf7bd9f2
SHA51214363895fd569c96d0000093ab9d9628095b09081cdd11eea81cdd77787f4bd05f4cb4826e964f054f0bbfec38874a5388d2cb697d387a2a7ea0016f320e347f