Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
b82df1198ec49348eaea1e6878e945e0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b82df1198ec49348eaea1e6878e945e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b82df1198ec49348eaea1e6878e945e0N.exe
-
Size
821KB
-
MD5
b82df1198ec49348eaea1e6878e945e0
-
SHA1
af9deedcde319c09a8c58c5260a31cb878657f99
-
SHA256
f9870c2fe49252d84fc801ef0ed1dde310e70eb9489857effeb55dffe3443729
-
SHA512
92ebab781687a5aebd8c266e10726785871de7c6d1ba54818ddd64ed7cccfdb8b7ed21ef6c0232bc955da777c883967e623c2dc512a8b09636947e72deff54af
-
SSDEEP
12288:UT+W6w1SHx/DONyCreU79aCwFa9Ti/8mJE3iCBu0tdQGhKJLZmN1SaEY:UTrsDCyC99P+ygEhB9KLZmN1SaEY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2220 CA55.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b82df1198ec49348eaea1e6878e945e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CA55.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 2220 4808 b82df1198ec49348eaea1e6878e945e0N.exe 84 PID 4808 wrote to memory of 2220 4808 b82df1198ec49348eaea1e6878e945e0N.exe 84 PID 4808 wrote to memory of 2220 4808 b82df1198ec49348eaea1e6878e945e0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82df1198ec49348eaea1e6878e945e0N.exe"C:\Users\Admin\AppData\Local\Temp\b82df1198ec49348eaea1e6878e945e0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\CA55.tmp"C:\Users\Admin\AppData\Local\Temp\CA55.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD5423799ea52a282d5e0f45ac0dae16503
SHA14bdd10bb844250cc9f6a1ffde3b2dc8b74451262
SHA256783200359866e179d870c1b7130b97de391a921fb20c5f08a8bac6f5da3a4857
SHA512a74cce2af641a071627c746abd5e8f5cfbc476614d86d00df4494c73d8fd86e4ccb59690cc1facfa1e6b5ddf5b208cc60db7370988f2f5a8587fdd241f5dc26a