Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe
Resource
win10v2004-20240802-en
General
-
Target
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe
-
Size
1.9MB
-
MD5
a9e9711abf53dffaebdbe84c9a8bc88b
-
SHA1
bb896213fca90c7c1872af1dc3228693e3b27091
-
SHA256
43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871
-
SHA512
b9d52e0c5b70160696a6f23d1fabbd5921622b127c3681e3ed36cb4368a861e0126573562ec40d5eba65b4a519d6a74f170103a379a02e5c41f5041a2acbb78d
-
SSDEEP
49152:Qoa1taC070d+fslKRkisGuPTk5jsddKzZY:Qoa1taC0LfsBXPTk5jWENY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3412 72CE.tmp -
Executes dropped EXE 1 IoCs
pid Process 3412 72CE.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72CE.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3412 5084 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 89 PID 5084 wrote to memory of 3412 5084 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 89 PID 5084 wrote to memory of 3412 5084 43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe"C:\Users\Admin\AppData\Local\Temp\43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\72CE.tmp"C:\Users\Admin\AppData\Local\Temp\72CE.tmp" --splashC:\Users\Admin\AppData\Local\Temp\43e6d80cea4ce701d133316e89a38ac62ac6571f80fe0f53c1a8066c8504f871.exe 756FA776700CF74CD0B34DC9E54EADF0EC1C931819AE9D1A5E7A3AA3D6F09B703FCDA3F097A523BF6874401B0FAEE66202AF0050FF721148F695BB0CFEE920812⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD557c7d15f69399e7d904648ff05e44685
SHA1155baa3f102e2199397a5cd9b0f7422867dd6aac
SHA256c24b059480009dfe2cfd18271735c9c01f2ab15f3a3ef7dae79998aa33dfe129
SHA5124cd62e3c8fcff8e915b981a67116988880d8e8d1d8d498464cb8dbdb06c782134ea7ba2a72bc0115e13b2c9a69de27ce5123c23ce37ab3239221e41463ce82a6