Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe
Resource
win10v2004-20240802-en
General
-
Target
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe
-
Size
1.2MB
-
MD5
01284d3ef501955ac9ed679e5cb32e23
-
SHA1
b86ead0f46e939b6fbde343520133de2daaac2da
-
SHA256
459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949
-
SHA512
bd9dfbd8090b8ad102c811121250829448210ae217c4867b0b19fcc078389a72268583b918f30ee0e7e22dbe8fdbb2e53318cad90536cd435656c39bd76f586b
-
SSDEEP
24576:MqDEvCTbMWu7rQYlBQcBiT6rprG8a3ZYTVJeO4M9JvgmG:MTvC/MTQYxsWR7a3m6mx
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 2524 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2524 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 30 PID 2296 wrote to memory of 2524 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 30 PID 2296 wrote to memory of 2524 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 30 PID 2296 wrote to memory of 2524 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 30 PID 2296 wrote to memory of 2524 2296 459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe"C:\Users\Admin\AppData\Local\Temp\459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\459d078aefc37782388eb6c6e1dedb4efc48eb7f3888893ebe1b0962b059a949.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD549a73306837e7ec8f98ff8493a824c40
SHA19a82f6d68e5f50a5026e74508b8b503cb0b52b94
SHA2565f53e9001b6262b634d2f91e3b7510cd2a1d8704d942e2a7d23d3b20560e35c2
SHA512104e8cf3991506e39ddef987f33d5407289da70cf0b0ec0bc4e2e5c9d309569c59115a019f7f0919e00e0932573b80e5f85105fdd47798c7a3ce53386bad7f91