Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
f807329c584f7192f3ca395cbe544530N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f807329c584f7192f3ca395cbe544530N.exe
Resource
win10v2004-20240802-en
General
-
Target
f807329c584f7192f3ca395cbe544530N.exe
-
Size
90KB
-
MD5
f807329c584f7192f3ca395cbe544530
-
SHA1
afabf70907c72e9319cd1bd8bef3a6e2b29b12fa
-
SHA256
13ea3a924c0ebdeb9820d4b8d0eb70542d928ee479c6284f44adbc8136638a9a
-
SHA512
f34a6c8dffc4bc2e264599e748370d3187f6a27f0dff76dd5258db979ca7e3fcc7f92979a183c337ed89f516ee0eed79f5b488a1f76fd9df9153e2f0ee4ba6b9
-
SSDEEP
1536:p3AT8kLL82H+zBa8s6c95azkQS8WDy8g83QLTW8IYek8twP+YPf:pQTnLo28a8sF9RQRN83QLS8dekfPFn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1892 f807329c584f7192f3ca395cbe544530N.exe -
Executes dropped EXE 1 IoCs
pid Process 1892 f807329c584f7192f3ca395cbe544530N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f807329c584f7192f3ca395cbe544530N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5040 f807329c584f7192f3ca395cbe544530N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5040 f807329c584f7192f3ca395cbe544530N.exe 1892 f807329c584f7192f3ca395cbe544530N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1892 5040 f807329c584f7192f3ca395cbe544530N.exe 85 PID 5040 wrote to memory of 1892 5040 f807329c584f7192f3ca395cbe544530N.exe 85 PID 5040 wrote to memory of 1892 5040 f807329c584f7192f3ca395cbe544530N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f807329c584f7192f3ca395cbe544530N.exe"C:\Users\Admin\AppData\Local\Temp\f807329c584f7192f3ca395cbe544530N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\f807329c584f7192f3ca395cbe544530N.exeC:\Users\Admin\AppData\Local\Temp\f807329c584f7192f3ca395cbe544530N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD58d16a45493d80db4f7368578b7616a87
SHA1f2de07f12b0a5d9400ca5d9bb2e0a5904be8675a
SHA256aa7156af48d9bbcfe76a260dbe93c83201041dc422e863d0d734c9f923232963
SHA512bc06585e0a82efbbb231981459b071ef301499f5c4e9a10527078e2b51f5b294f9aaa24e1339d6673e5ba76ec3fc49cc3befb8d773e4846b394487c12a7def3c