Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
1883e8de94808ebd9d8d25b0f60e06e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1883e8de94808ebd9d8d25b0f60e06e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1883e8de94808ebd9d8d25b0f60e06e0N.exe
-
Size
5.5MB
-
MD5
1883e8de94808ebd9d8d25b0f60e06e0
-
SHA1
4bbc4330abb7261ebe4537590fbe5c443fc26f77
-
SHA256
7265e6143c20a0c565a5ff36fbee23cd74c0b8979472ac6b36bfb4ac08a8813f
-
SHA512
004247c4f52b09c944c1ecc5dc3cb8751a8a2d4d40bb13a98c57a1491f9417d8616c940755b1f69639ded414b9a8a93d9226fe84def63d71b3108773be00a0d7
-
SSDEEP
98304:zFXZp6+Wvl3D1tBpzOUV3m+hVGiqhx0RHbNvR5D1toKOQ5MpIcRnVKN1f:xpLclppiUFm+X1v7lD1tZOBFVK3f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 69AB.tmp -
Executes dropped EXE 1 IoCs
pid Process 2740 69AB.tmp -
Loads dropped DLL 1 IoCs
pid Process 2824 1883e8de94808ebd9d8d25b0f60e06e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1883e8de94808ebd9d8d25b0f60e06e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2740 2824 1883e8de94808ebd9d8d25b0f60e06e0N.exe 30 PID 2824 wrote to memory of 2740 2824 1883e8de94808ebd9d8d25b0f60e06e0N.exe 30 PID 2824 wrote to memory of 2740 2824 1883e8de94808ebd9d8d25b0f60e06e0N.exe 30 PID 2824 wrote to memory of 2740 2824 1883e8de94808ebd9d8d25b0f60e06e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1883e8de94808ebd9d8d25b0f60e06e0N.exe"C:\Users\Admin\AppData\Local\Temp\1883e8de94808ebd9d8d25b0f60e06e0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\69AB.tmp"C:\Users\Admin\AppData\Local\Temp\69AB.tmp"2⤵
- Deletes itself
- Executes dropped EXE
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD50e4c10a8d840119de1c95f96d1c40389
SHA1575ca609ee2665fc79814e74c7c40819fabec399
SHA2562eaeea74f423bba4ce4eeb106cde541c3bf455542fbd5e9a48c8d818aef2dc5d
SHA5127c8d3da2cc6c181ef36b80c11be9f4fe2c731918120d9a6e42b565dc825a2f37a41759e9f4dfa186732cf85e804407a811a6ef47437bea05b502532062bd4253