Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe
Resource
win10v2004-20240802-en
General
-
Target
0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe
-
Size
1.2MB
-
MD5
606af0a311fcb097fdce0ea71567c488
-
SHA1
88078d9cd7a950d10a03fa689ed7279a001462a4
-
SHA256
0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff
-
SHA512
a8b9933ca148e9902099b5a0294463634b16984763e77faddda9640cd0894918c7eefa4c4b97d74db4556c1bd5c0e6bf25c296f5bee84ea7b2b9ef19546e9352
-
SSDEEP
24576:FqDEvCTbMWu7rQYlBQcBiT6rprG8arYdhB6yFHxmQTOIUh:FTvC/MTQYxsWR7arKfRxmQTn
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 956 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe 956 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 956 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 86 PID 2332 wrote to memory of 956 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 86 PID 2332 wrote to memory of 956 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 86 PID 2332 wrote to memory of 956 2332 0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe"C:\Users\Admin\AppData\Local\Temp\0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\0ef44cfb0a5a106c0f0520f32e01b0a06dfe54d93848fc5a7a92075f44eebdff.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5238378b47412f95f90707399cd971022
SHA12a61f0387e69e14b91e2e1fcd12090236d806da8
SHA2562cd2c3a0289213dd4f4552a9289247543dd8f030eaac756cc8a1e831a6f17a7e
SHA512b8de5059aa2b89d8da9746464041535e01ac9b1a27e28023b9b56690a4ab82ab6623837f4def835a0bf2906cd1acb4a6cdc7eefd01ba222f591506a7a30e4e5e