Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
731f284a2803d62c9f46334433652c90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
731f284a2803d62c9f46334433652c90N.exe
Resource
win10v2004-20240802-en
General
-
Target
731f284a2803d62c9f46334433652c90N.exe
-
Size
84KB
-
MD5
731f284a2803d62c9f46334433652c90
-
SHA1
ee821c903c6d33c674f0b79a6ce57157b45417ed
-
SHA256
49e8df080274d9e019e33691fc100ce687ca26f910803f292f29231538c1876e
-
SHA512
6defd4f7b333ab46d7201dcea40b977eff5668f5f0745557f5aba946b0b81b1e7149e031d5954b1944479cd5e2bc1dd76fdbc071dc22d4757b0befd934b05cb1
-
SSDEEP
768:eFq/4qn0F1raGCI3FfeMLT++G31LSadk344524444/M5zy6wSQte9SOVmhf9Ez6:qk4e0VCI33T++C1uaeN6ytQteVmhFE2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2120 edurss.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 731f284a2803d62c9f46334433652c90N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edurss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 731f284a2803d62c9f46334433652c90N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2120 2924 731f284a2803d62c9f46334433652c90N.exe 31 PID 2924 wrote to memory of 2120 2924 731f284a2803d62c9f46334433652c90N.exe 31 PID 2924 wrote to memory of 2120 2924 731f284a2803d62c9f46334433652c90N.exe 31 PID 2924 wrote to memory of 2120 2924 731f284a2803d62c9f46334433652c90N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\731f284a2803d62c9f46334433652c90N.exe"C:\Users\Admin\AppData\Local\Temp\731f284a2803d62c9f46334433652c90N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\edurss.exe"C:\Users\Admin\AppData\Local\Temp\edurss.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD52d01820329ac75f67846d4831b449f02
SHA171dca6a6453d9fa06fb038337ab7e9a09e437cc4
SHA2561bf30da083a08484f38a5c8d1778292a5d387342bb24a5ae1015fa9d20b20976
SHA512b843b087fb14f2a8ac797c1e900b01e2122e44aa030829839e8e1bff6cf7198722efee291355989b93c5a9b77e97500d231b87e56cc1884f42fecebe603d40bb