Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
Resource
win10v2004-20240802-en
General
-
Target
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
-
Size
1.9MB
-
MD5
4b3adcfdfd8ca94638c5e35457a78391
-
SHA1
c3724620dd9c44e55a84462384b7716c3e479caf
-
SHA256
d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa
-
SHA512
fc6377b682b59765e8b728c47387fdca8421acf08ec601984a1b37d6976b80fef73c93bd3026cf72e47426168cefca75f43d52e310553fb6d7d7e34004b1e6ac
-
SSDEEP
49152:Qoa1taC070dZxaNtDakSVjW1BxxuYb4wZ4Mvk+3d5DO:Qoa1taC0Ca3jS1AH8Mv53nDO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2056 7E19.tmp -
Executes dropped EXE 1 IoCs
pid Process 2056 7E19.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7E19.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2056 2256 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 86 PID 2256 wrote to memory of 2056 2256 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 86 PID 2256 wrote to memory of 2056 2256 d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe"C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\7E19.tmp"C:\Users\Admin\AppData\Local\Temp\7E19.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 662094A03DE771F2F80F472197A5B7F179C9049D7117DA2E0E78F248EDFD605BA5D499C098D6036D3D518712BE2B594FFEFAEBD179B623B25657FDA5DBD38B092⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5390cfc1b3f4e964c428c95a911bdc64b
SHA1e6f0df23ccf84bfc0a4142f23180e28d02c64369
SHA256985ea416613e9f8ec1b7e347ad64c6b10bdce2422d40354e25e8566de8cb6131
SHA512f000192b16a785523e908fc86e7be506e52ecdbe181e6cfdbc4199a961817f869262e76a626841af8e8107cc3566aa3c78026452a519563b7cfddae75d74f032