Analysis
-
max time kernel
110s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
c7d40ca9499e8020b887fd95b559faa0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c7d40ca9499e8020b887fd95b559faa0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c7d40ca9499e8020b887fd95b559faa0N.exe
-
Size
1.7MB
-
MD5
c7d40ca9499e8020b887fd95b559faa0
-
SHA1
b6e548fac1f44e79700f103f3f2ac689a06bae5d
-
SHA256
adc7bdca2223ab55d1d8706e3877ca6face9190b25d7524847945f2687be2e93
-
SHA512
17829ca8c4f176d509863d5909bc25d2891ba15c11e2c704a77c876e6da595e7e38cd14bdccb639faae80af041c2b2ec5182d8fae11bd5b9a11a06ce8a2b8260
-
SSDEEP
24576:T7FUDowAyrTVE3U5F8F248wUMYS0W8J19aHvs4e/N3zIDaSy/C7kYnwYc88l:TBuZrEUox8wUDB1L/p81y/ekYnwM8l
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3948 c7d40ca9499e8020b887fd95b559faa0N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7d40ca9499e8020b887fd95b559faa0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7d40ca9499e8020b887fd95b559faa0N.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3948 1352 c7d40ca9499e8020b887fd95b559faa0N.exe 86 PID 1352 wrote to memory of 3948 1352 c7d40ca9499e8020b887fd95b559faa0N.exe 86 PID 1352 wrote to memory of 3948 1352 c7d40ca9499e8020b887fd95b559faa0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7d40ca9499e8020b887fd95b559faa0N.exe"C:\Users\Admin\AppData\Local\Temp\c7d40ca9499e8020b887fd95b559faa0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\is-I10DN.tmp\c7d40ca9499e8020b887fd95b559faa0N.tmp"C:\Users\Admin\AppData\Local\Temp\is-I10DN.tmp\c7d40ca9499e8020b887fd95b559faa0N.tmp" /SL5="$C0056,866469,820736,C:\Users\Admin\AppData\Local\Temp\c7d40ca9499e8020b887fd95b559faa0N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD59c1993c188f1e514db5fe7ca55bde3b5
SHA109f53c3e68c3808e99f92a4e605007d0a00579f6
SHA256fb79fb056f1df0459bdc97b578dafad831ad24ecf52f879b8027a88e93cb23fe
SHA512013b2db31a083137b4c5d95b5a5d3bbae7da9473a6e33073f07c4fa08da1ce23fc546f63931f538119a7fae1305fd47228411b2f1073a5cadb13bb37fc886a68