Analysis
-
max time kernel
24s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
8728f416cc909f393523406851f6aac0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8728f416cc909f393523406851f6aac0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8728f416cc909f393523406851f6aac0N.exe
-
Size
7.8MB
-
MD5
8728f416cc909f393523406851f6aac0
-
SHA1
1cbec0a89eba1b128c3b50dd3fed9a1ff0a61b46
-
SHA256
f6f157d8f0d93052dc8cb8152bbf42c1d88316f3a1f55a02d25d6daf0a09a960
-
SHA512
00aa80fad809263e79221135b4d0edea4240dc1fb8e4e1d0bd4b23704696bab27bc8ab6cee7613f5a43f1d8d74cfb900bcd9a14be42e7f4b30fa1a57e0eaf67d
-
SSDEEP
98304:emhd1Urye5/WkimUy4MK6vu6/UV7wQqZUha5jtSyZIUb:elJPimf4SW6/U2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 6FE3.tmp -
Executes dropped EXE 1 IoCs
pid Process 2732 6FE3.tmp -
Loads dropped DLL 2 IoCs
pid Process 3028 8728f416cc909f393523406851f6aac0N.exe 3028 8728f416cc909f393523406851f6aac0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8728f416cc909f393523406851f6aac0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2732 3028 8728f416cc909f393523406851f6aac0N.exe 30 PID 3028 wrote to memory of 2732 3028 8728f416cc909f393523406851f6aac0N.exe 30 PID 3028 wrote to memory of 2732 3028 8728f416cc909f393523406851f6aac0N.exe 30 PID 3028 wrote to memory of 2732 3028 8728f416cc909f393523406851f6aac0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe"C:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\6FE3.tmp"C:\Users\Admin\AppData\Local\Temp\6FE3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe EAF91AC7EDE7BA806A37DB68CE4F815366BB910825677D01736F4548F70BC3941DFBBEE2CC312D6CBAC3FB4C3D6F18D6D40C7FCAA227B501D0EA5CD46C91D42F2⤵
- Deletes itself
- Executes dropped EXE
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD58f5df83cf0a1743d3206efba7be8355f
SHA162691ca7c239367c1f23a6218acbe74aebe9726b
SHA2569696532d8c711130a87c22bdb23b40b5d78d29afd6673febb8eebc4d96f8e4ec
SHA5120192b4cc3f9991cc190f1d75f17cd9089ac26f41630c192fd7ba39ae18a5b35443c59062a928e6a43fc4a8f4cdeaac6df8deb609a928c4c8e88e84219ddca654