Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
Resource
win10v2004-20240802-en
General
-
Target
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
-
Size
4.2MB
-
MD5
7bbcdf2e0aed9c52f8d8992e9d443d93
-
SHA1
9f6fd09739b5ec6103cff9919eb62eeaf1cef75c
-
SHA256
5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336
-
SHA512
101f4d331101d4481f660f7b4c837e5c46cb8a52832af71b218065f20ad67e6829ef7d7def9001b0e171a628064abf845386fa802fcf20e9efb718aacb3b4148
-
SSDEEP
98304:emhd1UryeoGq6BVChcuTdbYWVLUjH5oxFbxCVLUjH5oxFbx:elqOCh/TdbDVUjZEdCVUjZEd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4236 A8A4.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A8A4.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1208 wrote to memory of 4236 1208 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 86 PID 1208 wrote to memory of 4236 1208 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 86 PID 1208 wrote to memory of 4236 1208 5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe"C:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe A73767E97E178D294A7316F472A66C5386235199C38583CCC0B50BC15D8A39815E78AAE4567877E6D0709A6F07933D8860117B24952F500AC375E59087646B7C2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5a5b124ae31c9efd3fe3531740f55b834
SHA16e7bd148afa17b6d1a1ca1e496b4c87fc4eb8775
SHA256d287083ee88594952428a352bd7ae73efbd941410fa0cc84d579d4ddd68b8482
SHA5124da7bb179d503d919efa23c3071a86a2d6600132d7ca7b223de1640b086b2f07ebb6579e869b660ebd5af8534293d10092f601a59f6f43e599c7a8472f3df29d