Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
Resource
win10v2004-20240802-en
General
-
Target
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
-
Size
1.9MB
-
MD5
e761af159f59a88e309234e6524c0ab9
-
SHA1
23bb19728b058724d7dd83a76e997e1577e5b73b
-
SHA256
29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b
-
SHA512
2b3e55d19a4aa4de199a2f2f403520d757edb204fbbbd0ef202496c02b71be7089da1cf6eb37635abee8a7cc707c51a7df3a3cbc469390a3a2b349fe81baaf14
-
SSDEEP
49152:Qoa1taC070d02RUIRAYOgicG5QSzWpEHmV32Oc5/woMu:Qoa1taC00RYpcyQEm4dwoMu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5092 735B.tmp -
Executes dropped EXE 1 IoCs
pid Process 5092 735B.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 735B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2636 wrote to memory of 5092 2636 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 86 PID 2636 wrote to memory of 5092 2636 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 86 PID 2636 wrote to memory of 5092 2636 29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe"C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\735B.tmp"C:\Users\Admin\AppData\Local\Temp\735B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe CCE8C6C6890CF7180C309C52E40F3774D3B81D392BDDF8B42BA5E70E3309E7D747EC53C23A2136C260BEC02F57D247CEF1BCD1E764AC556CA1369E658435B9962⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57f701209ca1a35789f5a80d00058ac2a
SHA1f47799b095946d4e12f371db5e31776d7439d1cc
SHA25650650a7b307ae5ae034c4eec902de78835900bbabd92ad044ae97f0e9b328f76
SHA51248c54a42eaaa23da3e725cf7f55ecc154873584ec73f48e2e8395f799280f51d17ac10e382cc222a75621725b9ff7d664a3c55290b33e0212d1d68861872aad1