Analysis
-
max time kernel
101s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
8b7be5c5541c0ff8a2b39a08ca2c3370N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b7be5c5541c0ff8a2b39a08ca2c3370N.exe
Resource
win10v2004-20240802-en
General
-
Target
8b7be5c5541c0ff8a2b39a08ca2c3370N.exe
-
Size
32KB
-
MD5
8b7be5c5541c0ff8a2b39a08ca2c3370
-
SHA1
751fa4074b9fdccd429d93f2a5411e124141d16b
-
SHA256
7f2a57440ef2410df9479224b61cfb1e514bb8c2671611929000f7f9f9101b83
-
SHA512
2cfbe0073a098e49a736a3a91818a9d420d470cfa1e7d6a250931a05062509e1bca6d09a9875f51690f5e9f0a98413fcb272aa2d479d0f1e9c1e96eae15526a8
-
SSDEEP
384:Q98xUHQoYhmWPSQy4Ng8zLeiTer0WYLVNYjxJ52Al1DqPRaXBwEegvg:TwMmi5/gop/YYucP4w/Gg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinHttp = "C:\\Users\\Admin\\AppData\\Local\\WinHttp.exe" regedit.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b7be5c5541c0ff8a2b39a08ca2c3370N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1684 regedit.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2192 8b7be5c5541c0ff8a2b39a08ca2c3370N.exe 2192 8b7be5c5541c0ff8a2b39a08ca2c3370N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1684 2192 8b7be5c5541c0ff8a2b39a08ca2c3370N.exe 84 PID 2192 wrote to memory of 1684 2192 8b7be5c5541c0ff8a2b39a08ca2c3370N.exe 84 PID 2192 wrote to memory of 1684 2192 8b7be5c5541c0ff8a2b39a08ca2c3370N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b7be5c5541c0ff8a2b39a08ca2c3370N.exe"C:\Users\Admin\AppData\Local\Temp\8b7be5c5541c0ff8a2b39a08ca2c3370N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5f44153ef26be29552cf320325ad8b72e
SHA174ac72ba2ff0f871e59b11c95ad707372662370c
SHA256767009fb8726500a4bc54b2ee744cc3ada64fdf16a44e22ff9dfe7652e2a439f
SHA5121d42a4dba1d8d0df9f8fedfba384ffdbcff3103c8ba360f255b5d7e8a46128f40521e4d16cf6de04365b3b6ffad8bc681cf7042d92867ab3d912601a3d5e6e65
-
Filesize
32KB
MD5c6ce7740b7a3da99fa8e8b860c567e3c
SHA14dc49c29c3a35166b2fa69875332a195e69058f0
SHA256a0a83895b6fb858b7b84e48503cd5e40452bf3374557b2db3eb4cbcfb6659212
SHA512ddcfe2300192bcfe0bf48adce3755dd2ee0b8d2ea6081c09b922b59a5eabcf8dc6e1a4d7ec7cbaa282cecf8c6de8009936d711f91cb204a86d41fc74ab6201a7