Analysis
-
max time kernel
9s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
88bde0e624f818cc111309f8fa462190N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88bde0e624f818cc111309f8fa462190N.exe
Resource
win10v2004-20240802-en
General
-
Target
88bde0e624f818cc111309f8fa462190N.exe
-
Size
52KB
-
MD5
88bde0e624f818cc111309f8fa462190
-
SHA1
f1b0e01da74b62e04b9ffc34cf15d15b0807ec67
-
SHA256
58b70699a1e9794e968dda61f28c89fe41e217f57e38c143ef85e85376d39928
-
SHA512
a8c30ef357c0a99a0c47b82a1988df7bbe10ed276ccb144e415d68106b8f5b7ba477167d2a99742cbc40258e7cfb2fdb5e376fe5e155893ab2de19701a1c0c4d
-
SSDEEP
768:jJEHIzP41G5GNx00lRZNGu1ioXqFQnb5FAAMWlOwOq:jJYoP+dNx9LZ0YbXTmAMWUBq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1224 tjio.exe -
Loads dropped DLL 1 IoCs
pid Process 1716 88bde0e624f818cc111309f8fa462190N.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88bde0e624f818cc111309f8fa462190N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjio.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1716 88bde0e624f818cc111309f8fa462190N.exe 1224 tjio.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1224 1716 88bde0e624f818cc111309f8fa462190N.exe 31 PID 1716 wrote to memory of 1224 1716 88bde0e624f818cc111309f8fa462190N.exe 31 PID 1716 wrote to memory of 1224 1716 88bde0e624f818cc111309f8fa462190N.exe 31 PID 1716 wrote to memory of 1224 1716 88bde0e624f818cc111309f8fa462190N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\88bde0e624f818cc111309f8fa462190N.exe"C:\Users\Admin\AppData\Local\Temp\88bde0e624f818cc111309f8fa462190N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\tjio.exe"C:\Users\Admin\AppData\Local\Temp\tjio.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52cf88b451b6abf50d208f97b06d908d7
SHA15433bc0ea09747ed0d9ef23fe4b63a0d23a05b42
SHA2567f48e5659ba725586eeb40940eeba4d5180aee5f45dd7182a0b58b0ade88a99c
SHA51285c9d1be65cf1d9a64d455eedfdecf54b7903370106c1ddd4e0e87c1805b5ea9749ec833e78f375285830e11dbec72720613ed86359ce8e5380542d36806dc04