Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
6060546513e723f94100367c2982ca80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6060546513e723f94100367c2982ca80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6060546513e723f94100367c2982ca80N.exe
-
Size
90KB
-
MD5
6060546513e723f94100367c2982ca80
-
SHA1
a67c0aec126e86ab9c9c831aaf77faa12088de2a
-
SHA256
f4378517ee11368d6f8641b4113ab68c06d9ea137b7396aea4639f4c4bfb296c
-
SHA512
7cd2d9309afdc80fd177c6179b14ffc7ae3f3bb3a24b02f6e06f5bed6bbbb7fa8ed60d5a8546c5de79d7b77b3dfffe0979efd399c5ee7d96fba308906da871d0
-
SSDEEP
1536:8W/8XSGezxvCUkPXv0PdS0929n/T4WJcwugN2/TngTXYHbx/WRIN8CZ:8W/8XSGeaNXCd9Ylo8AVWu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 6060546513e723f94100367c2982ca80N.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 6060546513e723f94100367c2982ca80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6060546513e723f94100367c2982ca80N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3752 6060546513e723f94100367c2982ca80N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3752 6060546513e723f94100367c2982ca80N.exe 2756 6060546513e723f94100367c2982ca80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2756 3752 6060546513e723f94100367c2982ca80N.exe 86 PID 3752 wrote to memory of 2756 3752 6060546513e723f94100367c2982ca80N.exe 86 PID 3752 wrote to memory of 2756 3752 6060546513e723f94100367c2982ca80N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exe"C:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exeC:\Users\Admin\AppData\Local\Temp\6060546513e723f94100367c2982ca80N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD51759bcb076cecaf33b0a549e6d25a456
SHA1240ef8f43649a58708a3ccf8f4cccfd47da896d6
SHA25666fac9bda3b8355d3a16c2a4f8aa7e4b6cd264fe7fc4168acc09785782632b98
SHA512eba6d06990fe7ba46dbdec66a5cc1ff8a95b66f388b87e50be5974f784aa1433c5b015be488ddae9efe9c02077ba5a9718ca71be63d047255188aaf0d19feca2