Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe
Resource
win10v2004-20240802-en
General
-
Target
ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe
-
Size
1.2MB
-
MD5
db1bbff547488ab72b53499caa016bfe
-
SHA1
9883a77786a4e9574e8efd78fc15e9d8837f8d0a
-
SHA256
ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83
-
SHA512
00d6e673ea24aa1be6cad949ed5449d04ba342540e0e41a5113ecbee1edfc713fbc021f8bb651d5df0f84fd1528705c17a1f39c278d60910cae9dae2ec6c91d2
-
SSDEEP
24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8a0DYJR9FRzw/lBe:fTvC/MTQYxsWR7a0W9Fxw/l
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 2808 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe 2808 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2808 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 30 PID 2648 wrote to memory of 2808 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 30 PID 2648 wrote to memory of 2808 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 30 PID 2648 wrote to memory of 2808 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 30 PID 2648 wrote to memory of 2808 2648 ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe"C:\Users\Admin\AppData\Local\Temp\ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5df2cd555ad939e59859a447f1ecaf907
SHA13bced93911f9c029e4efc6c56f84b0f2db05dce4
SHA256e320ae6ad4c1fd14f4351bd970fc552c65b923d8f83836f6b9f2d2e65120b09d
SHA51279e9cd39b2d804aa96654e8b5d594021434b7c287db5be2c1b07afc50a7ca654ec677993fcddd017a7b4341558e4d597bf4bbdc006a8d210341beb629ecd5157