Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
eaeb5c2f0677f894599fa646ff16cec0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaeb5c2f0677f894599fa646ff16cec0N.exe
Resource
win10v2004-20240802-en
General
-
Target
eaeb5c2f0677f894599fa646ff16cec0N.exe
-
Size
274KB
-
MD5
eaeb5c2f0677f894599fa646ff16cec0
-
SHA1
f77790fbf4802887f18c0f59f36a509427e84d3c
-
SHA256
e093dacb75be02aee0a16734ea51516745b7ad3d763a883fc7cd7ea7b628e6c2
-
SHA512
75b6ada4ef3010fd966242bea26cdaca2cf2045b79a98105dbd89e32ce23872c0f099d59f388b6b676ea145b2904f50a5dcd96e4024f31cb89527cf0433abf4c
-
SSDEEP
6144:TzevND5hKqfWE4d1FzdlqpZtypIprdqYJslu0xfsLP:feDhXWld1Irvr4Xluufm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 eaeb5c2f0677f894599fa646ff16cec0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 eaeb5c2f0677f894599fa646ff16cec0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2812 eaeb5c2f0677f894599fa646ff16cec0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaeb5c2f0677f894599fa646ff16cec0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2812 eaeb5c2f0677f894599fa646ff16cec0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2712 2812 eaeb5c2f0677f894599fa646ff16cec0N.exe 31 PID 2812 wrote to memory of 2712 2812 eaeb5c2f0677f894599fa646ff16cec0N.exe 31 PID 2812 wrote to memory of 2712 2812 eaeb5c2f0677f894599fa646ff16cec0N.exe 31 PID 2812 wrote to memory of 2712 2812 eaeb5c2f0677f894599fa646ff16cec0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaeb5c2f0677f894599fa646ff16cec0N.exe"C:\Users\Admin\AppData\Local\Temp\eaeb5c2f0677f894599fa646ff16cec0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\eaeb5c2f0677f894599fa646ff16cec0N.exeC:\Users\Admin\AppData\Local\Temp\eaeb5c2f0677f894599fa646ff16cec0N.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5692da63c17b40b3eca415961c0049319
SHA1988e22c08eaf910640f64dea9f512212de9a504a
SHA2561e9014ea876c864772acb53b25057f4e9acdf750dcba5c378499f0ef31c5303f
SHA5129a8b3108721c68de07d4fc5c98b2794b02ad3a22f31d14b6622a43c5235ac5b5468a547ee453ab3ff5987d289c971f197d5e7a339f8989371b4e38053d85e201