Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
Resource
win10v2004-20240802-en
General
-
Target
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
-
Size
1.9MB
-
MD5
e761af159f59a88e309234e6524c0ab9
-
SHA1
23bb19728b058724d7dd83a76e997e1577e5b73b
-
SHA256
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b
-
SHA512
2b3e55d19a4aa4de199a2f2f403520d757edb204fbbbd0ef202496c02b71be7089da1cf6eb37635abee8a7cc707c51a7df3a3cbc469390a3a2b349fe81baaf14
-
SSDEEP
49152:Qoa1taC070d02RUIRAYOgicG5QSzWpEHmV32Oc5/woMu:Qoa1taC00RYpcyQEm4dwoMu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 ED3C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2308 ED3C.tmp -
Loads dropped DLL 1 IoCs
pid Process 1720 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ED3C.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2308 1720 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 31 PID 1720 wrote to memory of 2308 1720 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 31 PID 1720 wrote to memory of 2308 1720 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 31 PID 1720 wrote to memory of 2308 1720 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe"C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\ED3C.tmp"C:\Users\Admin\AppData\Local\Temp\ED3C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 326AA023C9EDEC361F0C61B67BEC3C6CD62D1D88C4A2E4F8BFD768606772A48B212CD1322EB5E217617C7F5060E160AFEC4F42015915F15E19B170B37F540A2D2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b058cbeb1625f011c8c871e92d83287a
SHA1cc43746633f17a64ec4c1e2bcf21542527a161a3
SHA2569e0b2529c8668f4b329e6a21ac1b748fd7348be76bdd2fd8f182f6a781216244
SHA5126f29e17ad4937e3d411ae163ec6659ec7a1ef6f8eede2b6d3ada2cee3e3e6ee189f42820c564993fa244f3b7fed7159a2e4a99defb88af4879a8c74386d9a748