Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 07:27
Behavioral task
behavioral1
Sample
ee3bfafbafe9b8002be46733ac0f14d0N.exe
Resource
win7-20240903-en
General
-
Target
ee3bfafbafe9b8002be46733ac0f14d0N.exe
-
Size
59KB
-
MD5
ee3bfafbafe9b8002be46733ac0f14d0
-
SHA1
c7c7ae950f681f6e8c77b0749b040f892604e876
-
SHA256
ddf16ba90736c7b384da4ebda487bdc887d015e9a78c9be59ca88ebfb5be5857
-
SHA512
33508c34767d221ffc201b29f4c506738580b970df1a2be3bba4afbd02178d967d2bd384ec8364bf885dba1462506e6d790ed0cb533133e6ec13151cba0bc6cb
-
SSDEEP
768:GyG0OBVsY/Wc8B/VUmPlWLr7Xa07U5WaJYN3GPdwuz7djEM2RYlEVt9Gn+MrkWk:k5V7xQ/flWL8+G1w2d7YsEVt9vWk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2812 ee3bfafbafe9b8002be46733ac0f14d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 ee3bfafbafe9b8002be46733ac0f14d0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe -
resource yara_rule behavioral1/memory/2436-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2812-16-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x000e0000000122ed-8.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee3bfafbafe9b8002be46733ac0f14d0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe 2812 ee3bfafbafe9b8002be46733ac0f14d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2812 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe 32 PID 2436 wrote to memory of 2812 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe 32 PID 2436 wrote to memory of 2812 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe 32 PID 2436 wrote to memory of 2812 2436 ee3bfafbafe9b8002be46733ac0f14d0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee3bfafbafe9b8002be46733ac0f14d0N.exe"C:\Users\Admin\AppData\Local\Temp\ee3bfafbafe9b8002be46733ac0f14d0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\ee3bfafbafe9b8002be46733ac0f14d0N.exeC:\Users\Admin\AppData\Local\Temp\ee3bfafbafe9b8002be46733ac0f14d0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD54ed12240963a2a35d35364b46df624c5
SHA17720afc80885bcef6ec959fc5d47e5d0323ec7e9
SHA256b5205c5376e792d89a5b13687535c41adc1580c2d4735a7edc957005e9269778
SHA512941506912555858e79d3b90cecba743336da03d2910c914da811952e4b2b271b486f37e9148c93ed15819ca09ea4ed60561d1719ce0f889b4d1b61d8cbfa9c9b