Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
7601b027e06487affea8765d71ec8a90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7601b027e06487affea8765d71ec8a90N.exe
Resource
win10v2004-20240802-en
General
-
Target
7601b027e06487affea8765d71ec8a90N.exe
-
Size
4.4MB
-
MD5
7601b027e06487affea8765d71ec8a90
-
SHA1
18c052699cc667eba0f87d82b77bdd2819272c3b
-
SHA256
ad237937b5fc003c6fae03a171755cf1b26aac7f727dbb5a8b1b0414f1ac5522
-
SHA512
49b1526e33245515d2a516be9eca4d39aaf845a051a2cab972cdcaa315b035a1e343d957165ff28e47318590c2a3470d99b1c19af2317819772afdf68587271f
-
SSDEEP
98304:emhd1Uryeiw7lj+YIpABV7wQqZUha5jtSn:ell7ljK62QbaZte
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4156 C60F.tmp -
Executes dropped EXE 1 IoCs
pid Process 4156 C60F.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7601b027e06487affea8765d71ec8a90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C60F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4156 3776 7601b027e06487affea8765d71ec8a90N.exe 89 PID 3776 wrote to memory of 4156 3776 7601b027e06487affea8765d71ec8a90N.exe 89 PID 3776 wrote to memory of 4156 3776 7601b027e06487affea8765d71ec8a90N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7601b027e06487affea8765d71ec8a90N.exe"C:\Users\Admin\AppData\Local\Temp\7601b027e06487affea8765d71ec8a90N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7601b027e06487affea8765d71ec8a90N.exe 4E45E1FA6C42D995A508AC41001CAECA525D88838FEF2753AE0F35DFC39B194E311E7703F7ED4DBB1A1B201DBF5547552E7F5DB9C8CCD961BA482D636CCCA0032⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5f25c837bed2b80174bbb407ec938b432
SHA1d06886d7cbe222de898fcd9fac81608c8aea7c96
SHA256ecca09aabeb1e3b3fbeafe1cd56838045de0ecc0917ee86b588d050e3d190004
SHA512e827d38b43172b45db559bdac93885af4b2c86e9e717c96c0b45c7211c3b756d55a180242aebdacae3512180a786ee677fa782eca3a046827b706ae750ae064f