Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
b019d3f69376bcc780c1f606ad8e6510N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b019d3f69376bcc780c1f606ad8e6510N.exe
Resource
win10v2004-20240802-en
General
-
Target
b019d3f69376bcc780c1f606ad8e6510N.exe
-
Size
1024KB
-
MD5
b019d3f69376bcc780c1f606ad8e6510
-
SHA1
830970d083afd53d2c59c0e0c2de49bb58bbab31
-
SHA256
468263b966e7556f9bea35879c24bbf0a779f20ea983f7c21a5231ceae106dd2
-
SHA512
28c09f6f61e7c8aad4d948bab55e83983a13b37a8332f90adf024a3762a277945e5f119d4580b71ad9020424636847419dd05c46fbb4ac1ea3be2670f16fa5a1
-
SSDEEP
24576:Uamfc5IeoyoN8jxFB31b17hGJgz6FLZmN1VUZmSordfqs:Uamfc5pFlJo0YZmXiZmSadfq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1404 AB92.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b019d3f69376bcc780c1f606ad8e6510N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AB92.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1404 2888 b019d3f69376bcc780c1f606ad8e6510N.exe 83 PID 2888 wrote to memory of 1404 2888 b019d3f69376bcc780c1f606ad8e6510N.exe 83 PID 2888 wrote to memory of 1404 2888 b019d3f69376bcc780c1f606ad8e6510N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b019d3f69376bcc780c1f606ad8e6510N.exe"C:\Users\Admin\AppData\Local\Temp\b019d3f69376bcc780c1f606ad8e6510N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\AB92.tmp"C:\Users\Admin\AppData\Local\Temp\AB92.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5437c9fa15ff5f3b90978736759078caa
SHA132a93d297470ddaed5aab7465c93eca93ea39ec4
SHA256083f5c48c350290b0b2f16f46969b79ff6ce2d3e8a8e64fdf635920c6b58f77d
SHA5129a2d9ab859fe8f5a77768157eced1f8c034abaa0486e5d26b8af86537c4ac40643b0a833ce10256681d53c7fe792db1eea721843b6cb76cc0d0326cadcb08502