Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
829c6fba96e5e79a8ce397d391d16bc0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
829c6fba96e5e79a8ce397d391d16bc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
829c6fba96e5e79a8ce397d391d16bc0N.exe
-
Size
532KB
-
MD5
829c6fba96e5e79a8ce397d391d16bc0
-
SHA1
136985beb705d695f8a4c07af6a0dffee2814182
-
SHA256
7743b689bcf739580cb89db9873f737319c056a4fed796147af214cbfc067611
-
SHA512
ac306caef7b73e47bf8cc96c1121e95f724783e4e22eed94a7b63460268a28c5affab1a6bd0af29644c6345b3c85f59017654398c3c0841034642c7ebda23f4e
-
SSDEEP
12288:KdcAIffrC9fdm7naI6EFxUKmJdhwLjGN7fn5nPm:KdpInm9fdmuSFxUJvw+Rn5Pm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2236 9E71.tmp -
Executes dropped EXE 1 IoCs
pid Process 2236 9E71.tmp -
Loads dropped DLL 1 IoCs
pid Process 2412 829c6fba96e5e79a8ce397d391d16bc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 829c6fba96e5e79a8ce397d391d16bc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9E71.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2236 9E71.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2236 2412 829c6fba96e5e79a8ce397d391d16bc0N.exe 30 PID 2412 wrote to memory of 2236 2412 829c6fba96e5e79a8ce397d391d16bc0N.exe 30 PID 2412 wrote to memory of 2236 2412 829c6fba96e5e79a8ce397d391d16bc0N.exe 30 PID 2412 wrote to memory of 2236 2412 829c6fba96e5e79a8ce397d391d16bc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\829c6fba96e5e79a8ce397d391d16bc0N.exe"C:\Users\Admin\AppData\Local\Temp\829c6fba96e5e79a8ce397d391d16bc0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\9E71.tmp"C:\Users\Admin\AppData\Local\Temp\9E71.tmp" --pingC:\Users\Admin\AppData\Local\Temp\829c6fba96e5e79a8ce397d391d16bc0N.exe 469938AD39D57075B82D669B6C8AEF75BA66EC6B278DEB3F49B412D965107605208E08B2CD74D209BCD130F58EFF0CBBEAC9FF6340E08F34841ECC91F03F3A782⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD57f68a6f0fb51e8853ca7cbab5d87e121
SHA1ee528827c23c921d9448545133697b1eefce2c12
SHA2565f669bd65cd3697cf05f4b21c7d02f97f0a6bcde6466ecd8632d29a796455664
SHA5126fb5b521ca5701d4a54e2acb39c33559529819963563ed0c6fd0df0b3fc2dc1a5667a829800d6a857701c1d073255e3b28e5c212d4ee04e28b34f8eb7c9affb3