Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe
Resource
win10v2004-20240802-en
General
-
Target
390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe
-
Size
2.3MB
-
MD5
48ab9eda74c3333df314396e533df9fa
-
SHA1
03cda89f76cdc0731c0c1e437f274ee66d463dd1
-
SHA256
390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7
-
SHA512
e5aeec64ae70e37a3cc45896ac352982dccce74da408bec81f1062204086b6b5553d02721c88220dfbb88d4c2ebdef34f08ec26662941371f08b0289f9b03304
-
SSDEEP
49152:vJd3tALE5RP/d6IxNIKnL5mO8ofTrZAmmFV:v73t6C3CKL5mOl6N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1324 Game.exe -
Loads dropped DLL 1 IoCs
pid Process 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1324 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe 30 PID 2272 wrote to memory of 1324 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe 30 PID 2272 wrote to memory of 1324 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe 30 PID 2272 wrote to memory of 1324 2272 390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe"C:\Users\Admin\AppData\Local\Temp\390936f4621aa46298228571ee2ef641248eee92762983cf753835024aae5da7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Game.exeC:\Users\Admin\AppData\Local\Temp/Game.exe2⤵
- Executes dropped EXE
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD59ebc7dd20fa66f5deabfd8873a4ed8c6
SHA1cf1b1da0e5215738a8e972077be5804cb326b8ed
SHA256487bd28f3d0b43ed9827ba519d6d113c4f31059bd62b4492da586c7bc82a9474
SHA5125d0a052edec070ee573bc43ed9eb7eb92c0460efe60a5abc31d1200e092937b91eafce5492cd945d46645f9029f0f80a37907fe6292639d37f15f58dae377271