Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
c9a5d547eb80e22c8766665887579f00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9a5d547eb80e22c8766665887579f00N.exe
Resource
win10v2004-20240802-en
General
-
Target
c9a5d547eb80e22c8766665887579f00N.exe
-
Size
476KB
-
MD5
c9a5d547eb80e22c8766665887579f00
-
SHA1
b3b6367b30f4fe3974cd80339ed964a50df96b55
-
SHA256
b4743ef66cbd4a3a356ee815641ce83d6d36b0e5f0785b37d870724d03008642
-
SHA512
26421570877700ec61d4443b0565ee0c12fae7bc1c12ae167e68fad4f12c123f68b71622d0f259961b737c40192b520001514a9f8927867d72754720553f8679
-
SSDEEP
3072:01xXwSmJQMva8zFki2kXbcvpoADapZgIZuwRGbCU/P1eEp4Zm8q4Ou72/QLQbkOj:HJZv5zFiIOIgI2Jf8C/QLQbkODGC
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9a5d547eb80e22c8766665887579f00N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30 PID 2720 wrote to memory of 2888 2720 c9a5d547eb80e22c8766665887579f00N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"C:\Users\Admin\AppData\Local\Temp\c9a5d547eb80e22c8766665887579f00N.exe"2⤵PID:2888
-