Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
b0d14872eb0540b9104323068aae3200N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0d14872eb0540b9104323068aae3200N.exe
Resource
win10v2004-20240802-en
General
-
Target
b0d14872eb0540b9104323068aae3200N.exe
-
Size
362KB
-
MD5
b0d14872eb0540b9104323068aae3200
-
SHA1
977bbdfc1be594c52f83e63691d0cb01aae03db0
-
SHA256
46770e3b98107db4163779924daa0effd010f24c328e8bf2881e1133a530b162
-
SHA512
58d81ffc6a6de8b1a8a9d52effaf8e7dde5884fdbe288cd26166ef6ea270fd7a97305275fbadce459ea722980452841c9cdc5435147550619fd6bb8cf4738cc4
-
SSDEEP
6144:fXsk+pe496RY4UDtQVrldMd2k/JrAV40saiigCUlhu9a6r/V:0kx491QldMd2qJrAVQ5zCUlh+auV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2704 b0d14872eb0540b9104323068aae3200N.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 b0d14872eb0540b9104323068aae3200N.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 b0d14872eb0540b9104323068aae3200N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0d14872eb0540b9104323068aae3200N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2400 b0d14872eb0540b9104323068aae3200N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2704 b0d14872eb0540b9104323068aae3200N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2704 2400 b0d14872eb0540b9104323068aae3200N.exe 31 PID 2400 wrote to memory of 2704 2400 b0d14872eb0540b9104323068aae3200N.exe 31 PID 2400 wrote to memory of 2704 2400 b0d14872eb0540b9104323068aae3200N.exe 31 PID 2400 wrote to memory of 2704 2400 b0d14872eb0540b9104323068aae3200N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exe"C:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exeC:\Users\Admin\AppData\Local\Temp\b0d14872eb0540b9104323068aae3200N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD5b67e807dc092fcfa137160c3069b4421
SHA14a8b2f0d713d643ea0fd16750bd3eb2dfde56538
SHA256a5346c838b594edd6e9b3392b7beaa0fc3cb8ee1b96c2d9a92d2b0bc117f3e5a
SHA51215b6c42025c8c2ed49cbe575ba3fabd80d69a894e9fb599b76b7654e02abfbb4720cce2cafd4c3d18fd373caca7b8252f52c958e78487b41e45d82846cd6b41c