Analysis
-
max time kernel
80s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
d731cd11d36ec1893dab48e1a1f2b1a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d731cd11d36ec1893dab48e1a1f2b1a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d731cd11d36ec1893dab48e1a1f2b1a0N.exe
-
Size
197KB
-
MD5
d731cd11d36ec1893dab48e1a1f2b1a0
-
SHA1
47a4281cc14782fae6abf31d36d9d16bf9658032
-
SHA256
d596932032df59a72ca8388f365018015fa8085b8f137338207dfea86e8d88fa
-
SHA512
c13e54c57eb2de227fe6b05cff23d92470c649663a98be3057e7d20674631de1444930e2d4fe02d7ed50ea363d2743bce9a3b40edc8ae648cb73937df3fc4df7
-
SSDEEP
3072:K833xwTX1+W9uoHsd+Y/5AKPvAgeOF0Y5GfUnp4g8kBG8CjLaawR:KexwTXcuuZ9AfOFWfUnp4g8kVd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2136 d731cd11d36ec1893dab48e1a1f2b1a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 d731cd11d36ec1893dab48e1a1f2b1a0N.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 d731cd11d36ec1893dab48e1a1f2b1a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d731cd11d36ec1893dab48e1a1f2b1a0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2908 d731cd11d36ec1893dab48e1a1f2b1a0N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2136 d731cd11d36ec1893dab48e1a1f2b1a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2136 2908 d731cd11d36ec1893dab48e1a1f2b1a0N.exe 31 PID 2908 wrote to memory of 2136 2908 d731cd11d36ec1893dab48e1a1f2b1a0N.exe 31 PID 2908 wrote to memory of 2136 2908 d731cd11d36ec1893dab48e1a1f2b1a0N.exe 31 PID 2908 wrote to memory of 2136 2908 d731cd11d36ec1893dab48e1a1f2b1a0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d731cd11d36ec1893dab48e1a1f2b1a0N.exe"C:\Users\Admin\AppData\Local\Temp\d731cd11d36ec1893dab48e1a1f2b1a0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\d731cd11d36ec1893dab48e1a1f2b1a0N.exeC:\Users\Admin\AppData\Local\Temp\d731cd11d36ec1893dab48e1a1f2b1a0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD523ce930a8c54f6eba6774e2c88d98c79
SHA1729dd54f3cf927795835bcbcb70afa4ef6448800
SHA25669a511702fbb8b80fb731e4b66064fb8fb8759ea8a99ae46eef3c58d30b911d7
SHA512fbaeb2934be9b987cfc8e635d51420cd8c4e5dcaca50fa618270f24415291016bedd2d41eb8fc744e19b2edce668c45fbcfcc45d2162d40b0dfe0a505ac4e83b