Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe
Resource
win10v2004-20240802-en
General
-
Target
d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe
-
Size
1.9MB
-
MD5
c7d723a6774e2d7e2e07935a167ea18b
-
SHA1
9710d6b06b1ded2086dacd682fbfe3a17d079c7c
-
SHA256
d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165
-
SHA512
38680a351b98dc6da93830576666cafce478b729e1faee0099a20657f5876504a79074b382939b22b8d09d96af902b31a00fa7a1af686591b6382786ff55b326
-
SSDEEP
49152:Qoa1taC070dyIwf9dFcX86ADFVqof9/GVgtko:Qoa1taC0sMtcMNqoFUS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 196A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2744 196A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2260 d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 196A.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2744 2260 d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe 30 PID 2260 wrote to memory of 2744 2260 d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe 30 PID 2260 wrote to memory of 2744 2260 d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe 30 PID 2260 wrote to memory of 2744 2260 d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe"C:\Users\Admin\AppData\Local\Temp\d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\196A.tmp"C:\Users\Admin\AppData\Local\Temp\196A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe 57FC4ACE75F0EA080EB16BE57F8C6FBD0E129EBD156EB58760D021ECB9E42761D8584F57378637EF5328F33F43F98BA4AAC0B53F7CCB01FBD712E2D269546C352⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5265fca59756598b282a06cf0f6d42f51
SHA10aefeae8eef919ef3190f48beff4d13a5b81fa63
SHA25687df3ec082d81db6e291d0fa59afa0d915c4f1da842b6db4bb67d846b5283798
SHA512e7a5f481dfa2ca568755653e946d76c1ba3a55dde2d1e6b4a0d280f36fd7fac12f43e5fde4413a24b8baea0e559c19e09a6757a385bad2cd5ce360e2be20be23