Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
Resource
win10v2004-20240802-en
General
-
Target
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
-
Size
1.9MB
-
MD5
4b3adcfdfd8ca94638c5e35457a78391
-
SHA1
c3724620dd9c44e55a84462384b7716c3e479caf
-
SHA256
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa
-
SHA512
fc6377b682b59765e8b728c47387fdca8421acf08ec601984a1b37d6976b80fef73c93bd3026cf72e47426168cefca75f43d52e310553fb6d7d7e34004b1e6ac
-
SSDEEP
49152:Qoa1taC070dZxaNtDakSVjW1BxxuYb4wZ4Mvk+3d5DO:Qoa1taC0Ca3jS1AH8Mv53nDO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 9721.tmp -
Executes dropped EXE 1 IoCs
pid Process 2340 9721.tmp -
Loads dropped DLL 1 IoCs
pid Process 2124 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9721.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2340 2124 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 30 PID 2124 wrote to memory of 2340 2124 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 30 PID 2124 wrote to memory of 2340 2124 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 30 PID 2124 wrote to memory of 2340 2124 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe"C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\9721.tmp"C:\Users\Admin\AppData\Local\Temp\9721.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe B368CD824FFAF35EA376E14B1152B331CD3583BCF6A1ADD30252C5F06875F2CC1604E4F96C592D6F7B3F2064FEBC7F9DF6E5502FF25E4FC198FE52411A98B93F2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f967caa91e95ec63e59224797755d85e
SHA1fd9b2f9fdc9d929e8ae1370299057848965ed7c2
SHA256b5fb4a5f10a84dcbaf86018ccc58dd0b258a41595bd79ca0532d62ed3430bb2c
SHA512d42b201c0bed4c58074747818e5f8c4e9dc5a0e21d57ce5431143ea84da02590a0bf98c76f05a4ffe1f71aa9c8fe818dd39ca10517bd4d288e476d2d43b9f3ff