Analysis
-
max time kernel
23s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
499fbdbcb95654ba5f58257af000fd40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
499fbdbcb95654ba5f58257af000fd40N.exe
Resource
win10v2004-20240802-en
General
-
Target
499fbdbcb95654ba5f58257af000fd40N.exe
-
Size
1.2MB
-
MD5
499fbdbcb95654ba5f58257af000fd40
-
SHA1
218a399db7196695ccd8b6bd1b173acd706d7c7d
-
SHA256
4402b556db6f5956477194f3898dd5b6465980f2d6826f319a102aef8de9d2cd
-
SHA512
49626308f10094ee66256ceb8017371afdd8d26732d97d6d94cc19e3608fe6484a403e36b3ce0e808ac44374e4bbd7cca752b8e5d1f366d809dd2ccad19fb818
-
SSDEEP
24576:VxoWR/+780eTAPGm18MWHBaovhSU3FVlj4YVBAgmCMyXYA03o:VxPs80ekPsMWHBaYhSsFVOqygmPyXI3o
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2612 8363.tmp -
Executes dropped EXE 1 IoCs
pid Process 2612 8363.tmp -
Loads dropped DLL 1 IoCs
pid Process 3068 499fbdbcb95654ba5f58257af000fd40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 499fbdbcb95654ba5f58257af000fd40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8363.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2612 8363.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2612 3068 499fbdbcb95654ba5f58257af000fd40N.exe 30 PID 3068 wrote to memory of 2612 3068 499fbdbcb95654ba5f58257af000fd40N.exe 30 PID 3068 wrote to memory of 2612 3068 499fbdbcb95654ba5f58257af000fd40N.exe 30 PID 3068 wrote to memory of 2612 3068 499fbdbcb95654ba5f58257af000fd40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\499fbdbcb95654ba5f58257af000fd40N.exe"C:\Users\Admin\AppData\Local\Temp\499fbdbcb95654ba5f58257af000fd40N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\8363.tmp"C:\Users\Admin\AppData\Local\Temp\8363.tmp" --pingC:\Users\Admin\AppData\Local\Temp\499fbdbcb95654ba5f58257af000fd40N.exe 0C8A207584A349C6664E106FC9FC92BD216F7E6EFE0512553DF8F9CCDF02B9ACBC1B0C21BE67CC6CA1D04A0DD4B5C940C3726FC89793E6A50D49ABFBF85E56A12⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5234e3513896dff01257c979b74532631
SHA12223d3db6f54f5e48bbd1bdbcb3e70b2ca0fbda6
SHA256a598c9738964b676873db15ce333fc8ca8384f128d01d373dd4edd28a000e4eb
SHA5126613dedeed4d0fe12018fad45672fecc4402ff2da36a1b1c51d1ecf2cc95574c2fcfb4bf6d8cd8bb1ada295a655db0eb6996f5807c9d6f0dce18de5f1923ddd3