Analysis
-
max time kernel
90s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe
Resource
win10v2004-20240802-en
General
-
Target
c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe
-
Size
1.2MB
-
MD5
63c33d41a8aec200788fce7e09ce17b3
-
SHA1
7bf4522b3d448e8eeb976675e0278b7b29e12be2
-
SHA256
c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36
-
SHA512
7d0629bf699e1b7c3c61164f572de21b9c54dcc8acac98b1754753ac8fabf7ae02f3fc3c79519fbfa02fb14ccdd66c203a190d280e09edccf73e03b68f8caea7
-
SSDEEP
24576:CqDEvCTbMWu7rQYlBQcBiT6rprG8ai8GhPsSKWHNpNRDnLEEKj:CTvC/MTQYxsWR7ai8GhESlHvNlLEE
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1920 set thread context of 2192 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe 2192 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2192 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 88 PID 1920 wrote to memory of 2192 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 88 PID 1920 wrote to memory of 2192 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 88 PID 1920 wrote to memory of 2192 1920 c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe"C:\Users\Admin\AppData\Local\Temp\c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\c9d08598261923b5e8d1341f7d57341c3533e0d7efd97b9e2d4b126f57a89b36.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5d2a1f0416c8f61ffe294873506682c1c
SHA1493897ed26d946d79e3f0183d475c6559f87cd9d
SHA256be57b3777462090001f226b2698fba8347407fdd87acb4cee69a517b170c8379
SHA512c685b0089b4c97d5a58bb85ac0c47653171d98a6e69cc0057c45764e9ead045e8d4a2f6bec8385ed0424e8838826f26d4895f8016033575da8389399029d12f8