Analysis
-
max time kernel
80s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
53ed5aa276ff813225d6d5b6f22682d0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
53ed5aa276ff813225d6d5b6f22682d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
53ed5aa276ff813225d6d5b6f22682d0N.exe
-
Size
960KB
-
MD5
53ed5aa276ff813225d6d5b6f22682d0
-
SHA1
91569a0f3470c42a0ad448945130f55df912a713
-
SHA256
120c52342e0bc06132c4bdbb6d54bba82c8fd46d33c5bccc5116c22012a51b3c
-
SHA512
d711d3b6d0af0267700166adb3e0cafcb6eb2c02bab406f746d24fb06c31e57dceb57e42033f200b59b8d422e265ec33c7236757b2c0bd3a8d4e30645ba34810
-
SSDEEP
24576:mgqzar6u9zBZk1F779ftiz/yta/ZSE0E77i:mgcaOezBUlVi4gl0ES
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 580 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 580 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Loads dropped DLL 1 IoCs
pid Process 1496 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53ed5aa276ff813225d6d5b6f22682d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 580 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1496 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 580 53ed5aa276ff813225d6d5b6f22682d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 580 1496 53ed5aa276ff813225d6d5b6f22682d0N.exe 31 PID 1496 wrote to memory of 580 1496 53ed5aa276ff813225d6d5b6f22682d0N.exe 31 PID 1496 wrote to memory of 580 1496 53ed5aa276ff813225d6d5b6f22682d0N.exe 31 PID 1496 wrote to memory of 580 1496 53ed5aa276ff813225d6d5b6f22682d0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\53ed5aa276ff813225d6d5b6f22682d0N.exe"C:\Users\Admin\AppData\Local\Temp\53ed5aa276ff813225d6d5b6f22682d0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\53ed5aa276ff813225d6d5b6f22682d0N.exeC:\Users\Admin\AppData\Local\Temp\53ed5aa276ff813225d6d5b6f22682d0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5aa2b766fb4c71d16e06034f7030686fb
SHA1d2f08014e8ec479ed0d39c75ade4e9da23616c61
SHA256b078526c45bb4870a9495ca5971d1e9a8d1289096aaee47d4eb4ee2aa221de57
SHA5122eba473e255f71ed9ff8bbe1523152b24a5063157848c965f9e6f0ad4777a28ec9de725fbfc5e97f328090131990dba664760500493504cb2b032aaa77248c91