Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe
Resource
win10v2004-20240802-en
General
-
Target
a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe
-
Size
1.6MB
-
MD5
cdcd175b7d8c57d70cbe8dde6b38a25a
-
SHA1
3e3973d10df79619d422d3a306d8ccf534624770
-
SHA256
a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84
-
SHA512
18ada249a31c2a38f41659d90be5ebad253ad7a89ebb1b7f4370210f59e64d808733058ca58c051a72ab6722f8380586108db586ad1707ad2ee284364268aa8a
-
SSDEEP
24576:WqDEvCTbMWu7rQYlBQcBiT6rprG8acthteEkaQzmq0/z11U3Ncu:WTvC/MTQYxsWR7aSAEL1UG
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 2336 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2336 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 86 PID 4992 wrote to memory of 2336 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 86 PID 4992 wrote to memory of 2336 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 86 PID 4992 wrote to memory of 2336 4992 a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe"C:\Users\Admin\AppData\Local\Temp\a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a67db17216640f8933f8f10b3fdf993e79b5ba3dbdfc37245d45c815aa408d84.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD556b96c8d4c091c81d9a1cb8421829a72
SHA143aee96efb0acc54e9d89d084dacaffa7350dcd5
SHA25635acbabbac54562f9c6b4cf86229fc259b1f8c818c96f1adedac7482566b723d
SHA51270550d1fb91a7fb93eed6980cfdac6c4cc6a7f1a6bf6a76856bdc14ff0a5fc3247821009fc645cc292fdbb346b79c199f7f9740a94a7a37427c521db81032375