Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
6060546513e723f94100367c2982ca80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6060546513e723f94100367c2982ca80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6060546513e723f94100367c2982ca80N.exe
-
Size
90KB
-
MD5
6060546513e723f94100367c2982ca80
-
SHA1
a67c0aec126e86ab9c9c831aaf77faa12088de2a
-
SHA256
f4378517ee11368d6f8641b4113ab68c06d9ea137b7396aea4639f4c4bfb296c
-
SHA512
7cd2d9309afdc80fd177c6179b14ffc7ae3f3bb3a24b02f6e06f5bed6bbbb7fa8ed60d5a8546c5de79d7b77b3dfffe0979efd399c5ee7d96fba308906da871d0
-
SSDEEP
1536:8W/8XSGezxvCUkPXv0PdS0929n/T4WJcwugN2/TngTXYHbx/WRIN8CZ:8W/8XSGeaNXCd9Ylo8AVWu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 6060546513e723f94100367c2982ca80N.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 6060546513e723f94100367c2982ca80N.exe -
Loads dropped DLL 1 IoCs
pid Process 2068 6060546513e723f94100367c2982ca80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6060546513e723f94100367c2982ca80N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 6060546513e723f94100367c2982ca80N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2068 6060546513e723f94100367c2982ca80N.exe 2084 6060546513e723f94100367c2982ca80N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2084 2068 6060546513e723f94100367c2982ca80N.exe 31 PID 2068 wrote to memory of 2084 2068 6060546513e723f94100367c2982ca80N.exe 31 PID 2068 wrote to memory of 2084 2068 6060546513e723f94100367c2982ca80N.exe 31 PID 2068 wrote to memory of 2084 2068 6060546513e723f94100367c2982ca80N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exe"C:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exeC:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5f7a551ecad5a503c81d6e7419ed42352
SHA12c8453293a4c1ea51eb1d4a925902f28a7eac8e6
SHA25623953626f1727c1bda54214848020795ef5ca6510f79da7829177f761426422d
SHA5127c8accdf76fca598af633ab0aa3e4e811148ffbc7c3d90eb8b11dd8f97504d7f3ed25828a4609ccd5e6385bf7b55d064a11b3426472c5ed9fa0842f981cce384