Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe
Resource
win10v2004-20240802-en
General
-
Target
9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe
-
Size
1.9MB
-
MD5
c281d986d6270f976f5eb51ea10c3f11
-
SHA1
ca3b82cccac373b865aee5a71d05795012f2d537
-
SHA256
9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a
-
SHA512
3dc67685e3a39c1109184ea5acedcfcf634d8c34c564dae7301ef90fdd94c767bf1fcebcefa1fd9c75358e7471b231433080eec57a56cd0051693b4c4fb6cbc7
-
SSDEEP
49152:Qoa1taC070dLfN5qxBfh14lpgcdJ4/AXnPHyMT:Qoa1taC0gfNM3h1AhJ4wPSMT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 3C64.tmp -
Executes dropped EXE 1 IoCs
pid Process 2516 3C64.tmp -
Loads dropped DLL 1 IoCs
pid Process 1732 9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C64.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2516 1732 9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe 29 PID 1732 wrote to memory of 2516 1732 9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe 29 PID 1732 wrote to memory of 2516 1732 9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe 29 PID 1732 wrote to memory of 2516 1732 9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe"C:\Users\Admin\AppData\Local\Temp\9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9f35ad9a67e8302252d04fe05c329365f66ea5fe741f305f0b8cb0af0112ba7a.exe 45669CB912B3687374B60F419F058E80F5DBD0495CE6A01CDBD585734A09E280F464C6C945266E0AAB4B97B902902E804B4319C472F8FAD494A4BE2E65392D322⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57a72d7360e301b0ec67b5d253ad35f4a
SHA1f637fc9c087003f31280250522d9d4afdd39bd9c
SHA25602d4e9b8aa48c9a3fd35630ef1a12620e675c3b13e0c8e6b1dd363c411fa0b70
SHA51200022be48d0e6de9bb7021087fc6a7f7782648af82260b80288a34439bc2063fd09b92856b85f31b54e46912ab2f5d52792df6e0b4ea8069235cd5e50f3ea6e1