Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
f713ec0978da17f79ce7aeea9a60ad30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f713ec0978da17f79ce7aeea9a60ad30N.exe
Resource
win10v2004-20240802-en
General
-
Target
f713ec0978da17f79ce7aeea9a60ad30N.exe
-
Size
648KB
-
MD5
f713ec0978da17f79ce7aeea9a60ad30
-
SHA1
37f7fda311c6fdb9f9f53285b83f86dbce667437
-
SHA256
21019d1c87a1dfbc77c178d1edfd873dd343e7b1aa8c12c5b90af3dd4a04491c
-
SHA512
269963442e5fda37de3bdccb8b20f3b56faeaa046ca27a0bac16ef9cad3dee39de796614b12e3e525c9759caafde8885beaf4e28daa3d942c03e07d0d7317fa7
-
SSDEEP
12288:TC5ZMKQauyaVZzdXtoNPN4QUQauyaVZzdXI:WXOabaVjKNPfabaVjY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 604 f713ec0978da17f79ce7aeea9a60ad30N.exe -
Executes dropped EXE 1 IoCs
pid Process 604 f713ec0978da17f79ce7aeea9a60ad30N.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f713ec0978da17f79ce7aeea9a60ad30N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe 604 f713ec0978da17f79ce7aeea9a60ad30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 604 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe 32 PID 2512 wrote to memory of 604 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe 32 PID 2512 wrote to memory of 604 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe 32 PID 2512 wrote to memory of 604 2512 f713ec0978da17f79ce7aeea9a60ad30N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe"C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exeC:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD57d87e2c004976f2a835a72e0bc2ada85
SHA141b649e14a2feb0e0efc4e7591a09dfbec1e126c
SHA256524d05f6d11578fbb89e326bdbf7865d67a12c27349396abdfb4204db3d95dc8
SHA512b8c1d691b7233c089d8002822aba4ee0da25bfaf60e26a74faa000df8d99189041ac307d6ca35fbe7d59ca9ed0ed8c83c1c20c56e65bddc09d12e4406a8ac100