Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
566469cb309844b858c29dbf525e99f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
566469cb309844b858c29dbf525e99f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
566469cb309844b858c29dbf525e99f0N.exe
-
Size
7.0MB
-
MD5
566469cb309844b858c29dbf525e99f0
-
SHA1
0930a6416ae1842872520fe5a28adc47fed123ff
-
SHA256
9bd785a2b6995a69bb0db1b71aa8af64e4fa5d03a1a2458591226e68cb0358ce
-
SHA512
bf1aa25be3d1247b4b5ca1d109afe24b2d3ff7cef7cc526c44440da943e6d0b1d0dde9bcb4e9f7eeb5a177d02c7f453a5ebcf6137467b68e2576fe21f76065e6
-
SSDEEP
98304:emhd1Uryesp3K2GJwod4XFFV7wQqZUha5jtSyZIUbn:elQaPiF1F2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 D1D0.tmp -
Executes dropped EXE 1 IoCs
pid Process 2372 D1D0.tmp -
Loads dropped DLL 2 IoCs
pid Process 3032 566469cb309844b858c29dbf525e99f0N.exe 3032 566469cb309844b858c29dbf525e99f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 566469cb309844b858c29dbf525e99f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2372 3032 566469cb309844b858c29dbf525e99f0N.exe 31 PID 3032 wrote to memory of 2372 3032 566469cb309844b858c29dbf525e99f0N.exe 31 PID 3032 wrote to memory of 2372 3032 566469cb309844b858c29dbf525e99f0N.exe 31 PID 3032 wrote to memory of 2372 3032 566469cb309844b858c29dbf525e99f0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\566469cb309844b858c29dbf525e99f0N.exe"C:\Users\Admin\AppData\Local\Temp\566469cb309844b858c29dbf525e99f0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\D1D0.tmp"C:\Users\Admin\AppData\Local\Temp\D1D0.tmp" --splashC:\Users\Admin\AppData\Local\Temp\566469cb309844b858c29dbf525e99f0N.exe F574735B66D7F8D6C28D8149F397DEEC8D53B23EBA0C07ECFCB764115D44E9D9B414D91FFE31B0DFDFE8CAFFD871BC21DB26230635A66DB5E68BC05D67AE2DDC2⤵
- Deletes itself
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD59b9e1f232b72cc36d238f82890b8fbda
SHA106e80f5bfa9f531261b089499a692f41df1ab552
SHA25627e22e7e9da9023d7ef311d274b63e36119515ede0960b7b07b685d7d9019e02
SHA5127a1cc7dea7344c410ee662ed35a0644c5e61c68d9e7f175de14e650ba19782156514ab1f850983af7b1dd41a2ad568d8276752f867a7efc44af1246d0beee3c0