Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
5eed5081084c94e8fc420dfbdf5fb960N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5eed5081084c94e8fc420dfbdf5fb960N.exe
Resource
win10v2004-20240802-en
General
-
Target
5eed5081084c94e8fc420dfbdf5fb960N.exe
-
Size
6.6MB
-
MD5
5eed5081084c94e8fc420dfbdf5fb960
-
SHA1
a8dbbab463663006e2409f4cbc629707b6ae069d
-
SHA256
c34846c546e71c6f3d1a648fdf0f3a1707722042f029a1b1e1ec8370fa7741f5
-
SHA512
75d2e2601b71d81a26493e9e51233234954a7ee8668a6125ccf9e7dd5d6ab49775c98ce3f461905cb8397391cf205c0fd4ace78b87e3a7c15674a462dae909ae
-
SSDEEP
98304:emhd1UryeUmNYdrU1spkj1UoR1Hb/1V7wQqZUha5jtSyZIUbV:elZ1spo1VRpz12QbaZtli8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 7A7F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2404 7A7F.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7A7F.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eed5081084c94e8fc420dfbdf5fb960N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2404 2284 5eed5081084c94e8fc420dfbdf5fb960N.exe 87 PID 2284 wrote to memory of 2404 2284 5eed5081084c94e8fc420dfbdf5fb960N.exe 87 PID 2284 wrote to memory of 2404 2284 5eed5081084c94e8fc420dfbdf5fb960N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eed5081084c94e8fc420dfbdf5fb960N.exe"C:\Users\Admin\AppData\Local\Temp\5eed5081084c94e8fc420dfbdf5fb960N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"C:\Users\Admin\AppData\Local\Temp\7A7F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5eed5081084c94e8fc420dfbdf5fb960N.exe 5335D9AFBD1AF345AAB57B20CF1AD0E2CC90F9E85FA9BFF77F56E23141A4701CD5CDDBE667BEB1198494D95A0CEAC80D75B7CD17F386E8807064D30577B52DAC2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD545f019777bd43eaac0f18a3116944d0e
SHA11ea2a8f8ae1050d7cc3479d19fca4642f1901760
SHA256a38ad8d9547b5c6fb8f5917e8a5eb553c9b106eea3117501f2b86bc6919c0e7d
SHA5126136ae82f8f47ea22e23bfe4a3c8c8849d537d48eda6ce6cde021883e110449a3ad9b6efd0e63b0412c6436cf4434e0034b2ae3241c5b691f709ee05ebbe0221