Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
b82df1198ec49348eaea1e6878e945e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b82df1198ec49348eaea1e6878e945e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b82df1198ec49348eaea1e6878e945e0N.exe
-
Size
821KB
-
MD5
b82df1198ec49348eaea1e6878e945e0
-
SHA1
af9deedcde319c09a8c58c5260a31cb878657f99
-
SHA256
f9870c2fe49252d84fc801ef0ed1dde310e70eb9489857effeb55dffe3443729
-
SHA512
92ebab781687a5aebd8c266e10726785871de7c6d1ba54818ddd64ed7cccfdb8b7ed21ef6c0232bc955da777c883967e623c2dc512a8b09636947e72deff54af
-
SSDEEP
12288:UT+W6w1SHx/DONyCreU79aCwFa9Ti/8mJE3iCBu0tdQGhKJLZmN1SaEY:UTrsDCyC99P+ygEhB9KLZmN1SaEY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2364 D78A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2364 D78A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2556 b82df1198ec49348eaea1e6878e945e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b82df1198ec49348eaea1e6878e945e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D78A.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2364 2556 b82df1198ec49348eaea1e6878e945e0N.exe 30 PID 2556 wrote to memory of 2364 2556 b82df1198ec49348eaea1e6878e945e0N.exe 30 PID 2556 wrote to memory of 2364 2556 b82df1198ec49348eaea1e6878e945e0N.exe 30 PID 2556 wrote to memory of 2364 2556 b82df1198ec49348eaea1e6878e945e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82df1198ec49348eaea1e6878e945e0N.exe"C:\Users\Admin\AppData\Local\Temp\b82df1198ec49348eaea1e6878e945e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\D78A.tmp"C:\Users\Admin\AppData\Local\Temp\D78A.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD5d8b58f13b14f7235ccc02806adfff9bb
SHA1d7af1526835614b8313507db3b0aa5d7a45c531d
SHA256c57efd5281ae7f879411bd428b7fc7226df794cfb9449644195c5ecb4f1f2a9c
SHA5128d115aa5dfe2f098d436a93f178ee4b82f07ee9d74ceded052206d80761c4749aa65d5d69742e26fde79787519e2024084cc923a8c80e7d955df247f6c5cca07