Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe
Resource
win10v2004-20240802-en
General
-
Target
5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe
-
Size
90KB
-
MD5
a2738011de08d5b00266d066515afa0c
-
SHA1
43d7c39ae9d06d0aac446cc4314c5167a335f650
-
SHA256
5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33
-
SHA512
2846ae10104a659ea9c25ef61f6d8534e8f508daded2970a0997094a35f521e5278a11fff286555f3f7b8a21562619818864c84ac388ec598b73d066b7a98257
-
SSDEEP
1536:Posikj2KbUpNQaOO8mGdaSMgfF9A61mp4HaER3IjmwNTlNpx7zl4fXFUJLix8eVM:AsBZbUH1OYGmgfF9nfHao3cmwn3xpgxM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1080 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3380 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3380 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe 1080 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 1080 3380 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe 84 PID 3380 wrote to memory of 1080 3380 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe 84 PID 3380 wrote to memory of 1080 3380 5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe"C:\Users\Admin\AppData\Local\Temp\5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exeC:\Users\Admin\AppData\Local\Temp\5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5dc8c917bda495d6cc72ab1085fceef01fed1628544bab5e8799d4b5ef103d33.exe
Filesize90KB
MD5f021710041ddfed1a85faf3d7a0c4437
SHA1f40a9ded617f34a43cd66d71af4f16fc0d1e9347
SHA2568049b7d64f1a73c2032f79213d60fedd6013bebd48de05ed18ea82094ececefa
SHA512915d45eab319c919a71fe15e2dde3a231bbe1a59d576e233d7c06c0c839832aaff21cff6882d04bf65908c17c69e47f8e48af17bc37c03f767a4e5be10c1d4be