Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
8ea4b0787591ab711f388c624bfaf030N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ea4b0787591ab711f388c624bfaf030N.exe
Resource
win10v2004-20240802-en
General
-
Target
8ea4b0787591ab711f388c624bfaf030N.exe
-
Size
1.7MB
-
MD5
8ea4b0787591ab711f388c624bfaf030
-
SHA1
d0297bcae756c61b3debbae44c621b1136994009
-
SHA256
597752cc948d7c71f0800374a5321ddf4dd1f89f10d4cc7a51e06e0830b99c9c
-
SHA512
e9f53bdc7ed4384a67d96f329c2e05cccad3c09163371839de3e49f68225b6fa5b2daef544422ccb915319c7c394e4f273fd3008a44b0d0f811c01fb7a5c302d
-
SSDEEP
24576:f7FUDowAyrTVE3U5F/wa++t4ZBQxK+ByQjdJeTVISUi5gqSU4MrtjZ5NS1/8:fBuZrEUu+qQzB1QPhhf/jS0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3408 8ea4b0787591ab711f388c624bfaf030N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ea4b0787591ab711f388c624bfaf030N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ea4b0787591ab711f388c624bfaf030N.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 3408 2472 8ea4b0787591ab711f388c624bfaf030N.exe 86 PID 2472 wrote to memory of 3408 2472 8ea4b0787591ab711f388c624bfaf030N.exe 86 PID 2472 wrote to memory of 3408 2472 8ea4b0787591ab711f388c624bfaf030N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea4b0787591ab711f388c624bfaf030N.exe"C:\Users\Admin\AppData\Local\Temp\8ea4b0787591ab711f388c624bfaf030N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\is-0QVT7.tmp\8ea4b0787591ab711f388c624bfaf030N.tmp"C:\Users\Admin\AppData\Local\Temp\is-0QVT7.tmp\8ea4b0787591ab711f388c624bfaf030N.tmp" /SL5="$60236,837598,832512,C:\Users\Admin\AppData\Local\Temp\8ea4b0787591ab711f388c624bfaf030N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD52c820ca4e36643e642951bc3cfc922b4
SHA1e82e605de6aac653b90d4dece9be7b9b63cce757
SHA256f200fcf4e55473d111eafa1c2ba39263ce025bbd61b10e803452129f24f76b23
SHA512329eba988b975b414880cf8dab395b9f455889d81240ee896382215a45bafddb073c33a3307311260a6d76ba80fb1ed5b68ebd8c37fb83b462f16961c601e624