Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
a47d7942129157b7fea5024ab2da5100N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a47d7942129157b7fea5024ab2da5100N.exe
Resource
win10v2004-20240802-en
General
-
Target
a47d7942129157b7fea5024ab2da5100N.exe
-
Size
5.7MB
-
MD5
a47d7942129157b7fea5024ab2da5100
-
SHA1
9f51a44cbe33e7f9fd09270a7449f4613c79a707
-
SHA256
2c2c1f45f0fb945ce506acaa5d60ff96c3c26ea5c13a581c0578211a1b3d6926
-
SHA512
4c4d8af92df61234ac49cc1ef31cd3d4539bafbbe11010506f9a8d085d2d0fabfc5ca29212de28981f07fd933ed6d19bc124ba0a388a148cb06a0521452a6770
-
SSDEEP
98304:ft3PUdLVdGTGSzfRnlkCfsVy3KkKT/ZKllMFji6iKRLtFFfjZ8GxwC/o15JPi9kH:fpMbEyGfllkCeyQT8Iji65RRff1jx9o7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4228 a47d7942129157b7fea5024ab2da5100N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a47d7942129157b7fea5024ab2da5100N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a47d7942129157b7fea5024ab2da5100N.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4228 4492 a47d7942129157b7fea5024ab2da5100N.exe 83 PID 4492 wrote to memory of 4228 4492 a47d7942129157b7fea5024ab2da5100N.exe 83 PID 4492 wrote to memory of 4228 4492 a47d7942129157b7fea5024ab2da5100N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a47d7942129157b7fea5024ab2da5100N.exe"C:\Users\Admin\AppData\Local\Temp\a47d7942129157b7fea5024ab2da5100N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\is-HQGK1.tmp\a47d7942129157b7fea5024ab2da5100N.tmp"C:\Users\Admin\AppData\Local\Temp\is-HQGK1.tmp\a47d7942129157b7fea5024ab2da5100N.tmp" /SL5="$A0118,5623105,141824,C:\Users\Admin\AppData\Local\Temp\a47d7942129157b7fea5024ab2da5100N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52e30da9c21c0847dd7135895d6388d46
SHA13435b0964bd238022819733ea7f049b3b215df3e
SHA2560002f4046ef35e169fa79e2abf0b92212c1438487819dd8318301991ff99acac
SHA512d7dabdbeaab41eddfb045d55c4752485fe231373dd8e45af26add7a238e928fd7905ae3ee9a2df34f484eabe4d8b7bcda775ef12822993b1850a3daa58f06aae