Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/09/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe
Resource
win11-20240802-en
General
-
Target
4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe
-
Size
1.7MB
-
MD5
ba856e48421c75592a0b45953c21dd2c
-
SHA1
380e0bedddbb9e232b9169d51daa778dfa22118d
-
SHA256
4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c
-
SHA512
4675cc8016c75ea178175e5a5fb0b15c05cd36068a76b4952755b7225f6af6b6de5d6dcf990e965d48775307b6ecf1955da15da1d72def96fba02aa298215111
-
SSDEEP
49152:ppUlRhkMregcRijcwsCyb6Dgh3+bS22+UaIK179FwiZO1VpSu:ppUlhregcjCLgF+bSsUaIw9F01eu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4364 k1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4364 2156 4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe 83 PID 2156 wrote to memory of 4364 2156 4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe"C:\Users\Admin\AppData\Local\Temp\4563d61b8760e3d73772b888b1db881386b37a4aa5937fe1eff597793b427d9c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\k1.exe"C:\Users\Admin\AppData\Local\Temp\k1.exe"2⤵
- Executes dropped EXE
PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5692d72923747be1ed2c05cd6b4118bf4
SHA1046050976d2fa16cf25e10f4895011e066414b0e
SHA256c035c371f1ad9a96b51f28fbe9e6f7a402bf10cd1ca2d82aabbc78ba07c7703f
SHA5128c6780fe09f701ac3fa5f397a4aa88475b5e26e19621d66b7404c720df87e31a692004dee672cf76cf6327421c1aa2a14b1f09eb6933c2aaa8e74f2fef116548
-
Filesize
98B
MD51cff20fc77835e110b62445be05114c2
SHA17981667914201cf92fbcceb6d42a05de8a87f451
SHA2565b0263857106fa941b4fd3df40e3f2ade971a75f6b4847226aa150c620704595
SHA512a33564018c6629f612b8fe2a710553a0fc24ded14260798c4b6bc17298ba1089cff6dfb7c71ca9ba7f3a298fb0282e257de4c60b43c15c773d94a71c8a90b664