Analysis
-
max time kernel
95s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
Resource
win10v2004-20240802-en
General
-
Target
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
-
Size
7.0MB
-
MD5
ee62f6b133d214cfcb519f70cd86774c
-
SHA1
201e826ef70a432c9f7872173870b192a7af068b
-
SHA256
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86
-
SHA512
a914099fb84f42d4517a6c2c1aa84b0d324cb9eee5d2a578784b1c232d2db18f54098508b6d321c34404936f57cc6bb58212c4329291a904e2a8744ccbb41fd9
-
SSDEEP
98304:emhd1UryeAnQVi19EUGuKKHV7wQqZUha5jtSyZIUbn:elgnT1aUG2H2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4700 8CCF.tmp -
Executes dropped EXE 1 IoCs
pid Process 4700 8CCF.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8CCF.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4700 3220 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 86 PID 3220 wrote to memory of 4700 3220 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 86 PID 3220 wrote to memory of 4700 3220 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe"C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"C:\Users\Admin\AppData\Local\Temp\8CCF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 07E3F5824ABC55C9EE9D9529FC7064A7AFFB90D9C6A28DEFD3BDEA20BB491FD6F5E5E0DAF5AFD5D046209ACD866252386463FF15D62851F88ACF9B4BCC906C362⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD52be9c536d67b5eb3b3db8b42f0da98d5
SHA1f62ab6e8c5e4aad7a96d6f417f197b7d014c1387
SHA2569cf68ea1b6f2c7517f180fa5e777243a25e06d984f9cfde552c4d08d4dbbbe74
SHA512499c5fa5944dafd11fabede1370aefffe294a86e4cf7196b78642285ccfbbebf39d63ca9cb5c57cfdea4b1107dfe95713dec09b6017c16b983eba832d3816a3e