Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe
Resource
win10v2004-20240802-en
General
-
Target
3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe
-
Size
1.2MB
-
MD5
95d61c0de1faa96d30dddf4a1fba699c
-
SHA1
849c9832e654e4a8fe725907e1eb7f93e10cf71e
-
SHA256
3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987
-
SHA512
eefee76e7dbcebb455bf80b8746a553e3c0402ef96a31864593ee22fb1ed738076b5198f6b64d449d58882d46636b553007ef37a14f74b992a7f7cb70b3cc283
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a39LJKrCVXpk9OKTLq:ATvC/MTQYxsWR7a39L8rCVXk
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3140 set thread context of 4844 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe 4844 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4844 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 90 PID 3140 wrote to memory of 4844 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 90 PID 3140 wrote to memory of 4844 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 90 PID 3140 wrote to memory of 4844 3140 3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe"C:\Users\Admin\AppData\Local\Temp\3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\3833788ee0fb28513bf0d412c3e353caf377c85dc3bc84ba656a5e203799f987.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD538a4bfd6bae44148cdd20bb7ffb2cade
SHA17db5562c9cd82ba381e0271101d8ef3cabe3e576
SHA256107dac05d38949c2ff989b3bc248b46075da739f166c1b5f30e00bd03f99803f
SHA5123e7ad6e1e7e217e4c3a6054d2786e9733225aab8218ca0da89d47c535098c1e8b94689ef185d0831deac5a81d6b41cc8272c776c9cddddd61796b0ab58d3dd42