Analysis
-
max time kernel
111s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
a4cdebb3fb9389844ad4ddf1705d7b00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4cdebb3fb9389844ad4ddf1705d7b00N.exe
Resource
win10v2004-20240802-en
General
-
Target
a4cdebb3fb9389844ad4ddf1705d7b00N.exe
-
Size
2.1MB
-
MD5
a4cdebb3fb9389844ad4ddf1705d7b00
-
SHA1
db2d31b2645c67cab55fd2358f943af0c59daac1
-
SHA256
0487fca7b6fdf3fb700ea249b146d56c5ab2d2b81ed0b055986fe715b5a96e2c
-
SHA512
a37de4ce44cab5bede856d2afa0a6872472aa32f8d39166f917fe302c2f9a35101061ced1f4fddae527de656ea24e7eeb159b18f6d4d1a6edd03ad2c6a6c16a6
-
SSDEEP
24576:vtWuGvmxMhee5z1mqQp8qKs59YEkYaCLlJ9AMDt8jn+fvD2LgJstqtK2Kwc:1pxxMg6mWEkYlZJ9AQt8z0i3qt
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast\Version a4cdebb3fb9389844ad4ddf1705d7b00N.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast\Version a4cdebb3fb9389844ad4ddf1705d7b00N.tmp -
Executes dropped EXE 1 IoCs
pid Process 1648 a4cdebb3fb9389844ad4ddf1705d7b00N.tmp -
Loads dropped DLL 3 IoCs
pid Process 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 1648 a4cdebb3fb9389844ad4ddf1705d7b00N.tmp 1648 a4cdebb3fb9389844ad4ddf1705d7b00N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4cdebb3fb9389844ad4ddf1705d7b00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4cdebb3fb9389844ad4ddf1705d7b00N.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1648 a4cdebb3fb9389844ad4ddf1705d7b00N.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29 PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29 PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29 PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29 PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29 PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29 PID 2172 wrote to memory of 1648 2172 a4cdebb3fb9389844ad4ddf1705d7b00N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4cdebb3fb9389844ad4ddf1705d7b00N.exe"C:\Users\Admin\AppData\Local\Temp\a4cdebb3fb9389844ad4ddf1705d7b00N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\is-L72AT.tmp\a4cdebb3fb9389844ad4ddf1705d7b00N.tmp"C:\Users\Admin\AppData\Local\Temp\is-L72AT.tmp\a4cdebb3fb9389844ad4ddf1705d7b00N.tmp" /SL5="$401AC,1326512,906752,C:\Users\Admin\AppData\Local\Temp\a4cdebb3fb9389844ad4ddf1705d7b00N.exe"2⤵
- Checks for any installed AV software in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
3.1MB
MD5d3b07f5966c17d78fe6dc438a9d6eb1c
SHA17633a58125a489b0de6bd7fa91002853dd74aed8
SHA256481758cbeec8c7acb4952b1b5e9c38ec1837ec2a75bdace97a25037d7b10a98a
SHA512201955e8add455c050b660e9b9ddd0516be9069dbf016d2fa49a38954f137ab49c028c4d426fad169b35292c9d997226cdf30a89fce53e4e845aa9c53d73e4f0