Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
e20c657370a2adf61ec28844607f7a00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e20c657370a2adf61ec28844607f7a00N.exe
Resource
win10v2004-20240802-en
General
-
Target
e20c657370a2adf61ec28844607f7a00N.exe
-
Size
576KB
-
MD5
e20c657370a2adf61ec28844607f7a00
-
SHA1
e5589f794871c490168d1428bbf3201a9bac6657
-
SHA256
17678b1dce6d99600b292757667f3d7ed095dad488cd98144da2fe646f42365c
-
SHA512
8e7990e3c1de4a6c53adfa8c0173772b74f7aa4792747f69dd56ece692f28c460a39705b35433eec2f483e67c60bac1a626680d149466c735622d67080e5a3ac
-
SSDEEP
12288:53aEWYVFelJDHUVQ5zCN2j6FB5WMlL143VQb:laEWYVFelJDHUVQ5zg2mblLO3VQb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2880 e20c657370a2adf61ec28844607f7a00N.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 e20c657370a2adf61ec28844607f7a00N.exe -
Loads dropped DLL 1 IoCs
pid Process 2152 e20c657370a2adf61ec28844607f7a00N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e20c657370a2adf61ec28844607f7a00N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2152 e20c657370a2adf61ec28844607f7a00N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2880 e20c657370a2adf61ec28844607f7a00N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2880 2152 e20c657370a2adf61ec28844607f7a00N.exe 29 PID 2152 wrote to memory of 2880 2152 e20c657370a2adf61ec28844607f7a00N.exe 29 PID 2152 wrote to memory of 2880 2152 e20c657370a2adf61ec28844607f7a00N.exe 29 PID 2152 wrote to memory of 2880 2152 e20c657370a2adf61ec28844607f7a00N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e20c657370a2adf61ec28844607f7a00N.exe"C:\Users\Admin\AppData\Local\Temp\e20c657370a2adf61ec28844607f7a00N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\e20c657370a2adf61ec28844607f7a00N.exeC:\Users\Admin\AppData\Local\Temp\e20c657370a2adf61ec28844607f7a00N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD55b3533704636d06bd90211d9ddd03900
SHA174ff0612b431c2e5eb2185d1c6a1345d0a4cafde
SHA256656f3eb88423781280893ea4986e411d7a52c8d1d393e6507dd58e1fc47129e9
SHA5127646237197b41acda67055d211ad87baf40f7b608309ed47718d6abbbe6e4d502dd2494db5f364bbf8c4023ae30e7b97f5033e202ba2961fb5d0d26845345c5f