Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 15:34
Behavioral task
behavioral1
Sample
20e46f57c00a42727c8994b2a3298430N.exe
Resource
win7-20240903-en
General
-
Target
20e46f57c00a42727c8994b2a3298430N.exe
-
Size
57KB
-
MD5
20e46f57c00a42727c8994b2a3298430
-
SHA1
ec705c0ebef59ee7ad0958366b95604feb3ff7b5
-
SHA256
607f6e7c82adf823605e0b3a5978ca43c837594ac68d29560b96946a93763e7c
-
SHA512
324dd6c9ca280fa17ada9fa56a7d8b106dd54ff1d286f80c04e3b11da4af33d026a3cc1d801c3e239857e24e2def75353561d80bc281cf6536160c10ec3752fe
-
SSDEEP
768:KCLP5uK6DoYNi1BG46vfiPUta4xniyU3CKjfI:j5uKGVNi1WfGUtrxcyKU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2088 zmvmo.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 20e46f57c00a42727c8994b2a3298430N.exe -
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2080-7-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0007000000012119-4.dat upx behavioral1/memory/2088-9-0x0000000000400000-0x000000000040F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20e46f57c00a42727c8994b2a3298430N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmvmo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2088 2080 20e46f57c00a42727c8994b2a3298430N.exe 30 PID 2080 wrote to memory of 2088 2080 20e46f57c00a42727c8994b2a3298430N.exe 30 PID 2080 wrote to memory of 2088 2080 20e46f57c00a42727c8994b2a3298430N.exe 30 PID 2080 wrote to memory of 2088 2080 20e46f57c00a42727c8994b2a3298430N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e46f57c00a42727c8994b2a3298430N.exe"C:\Users\Admin\AppData\Local\Temp\20e46f57c00a42727c8994b2a3298430N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\zmvmo.exe"C:\Users\Admin\AppData\Local\Temp\zmvmo.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD530a569f6f0ae7db963750c3d5a549e7a
SHA1df13b7a04bd0787179fbebe4fd102a9d7c5472f7
SHA256eac7c2f41a1cabd3c03f6dd16a8e926c9a2d7105e9bb9ac4902d5b36c9936fb0
SHA5125d2cfffcf84f78840ab7d43269e4130df43253b935a4c23954072cc95ac37ea4771c51b68f23c3c965093d876943d4460df829c4ba42abfbbaadd98d0eaacd84