Analysis
-
max time kernel
100s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
48ea5a89bd5bb4f282089cf15fcb8140N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48ea5a89bd5bb4f282089cf15fcb8140N.exe
Resource
win10v2004-20240802-en
General
-
Target
48ea5a89bd5bb4f282089cf15fcb8140N.exe
-
Size
57KB
-
MD5
48ea5a89bd5bb4f282089cf15fcb8140
-
SHA1
974a0ca29d620ed2b63125bb742f7f6ed94904d7
-
SHA256
664711494699600eb0257c8dc647c402110fc3eaea33cb2da5d4bac40a954380
-
SHA512
d8d86958117bb34891ea9c73d2243a41355d589959db2d25458ae999231170e9eeea0d1606a635d7849242c5498b766ed422dfadf37a6f8047ca2155c72feca3
-
SSDEEP
1536:0AfXclvQUl4AS0j6zEiI84zezXggS9hw+U:08clvQUuI84zezwgR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 vusjeson.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 48ea5a89bd5bb4f282089cf15fcb8140N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48ea5a89bd5bb4f282089cf15fcb8140N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vusjeson.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2620 2256 48ea5a89bd5bb4f282089cf15fcb8140N.exe 29 PID 2256 wrote to memory of 2620 2256 48ea5a89bd5bb4f282089cf15fcb8140N.exe 29 PID 2256 wrote to memory of 2620 2256 48ea5a89bd5bb4f282089cf15fcb8140N.exe 29 PID 2256 wrote to memory of 2620 2256 48ea5a89bd5bb4f282089cf15fcb8140N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48ea5a89bd5bb4f282089cf15fcb8140N.exe"C:\Users\Admin\AppData\Local\Temp\48ea5a89bd5bb4f282089cf15fcb8140N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\vusjeson.exeC:\Users\Admin\AppData\Local\Temp\vusjeson.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD55c48403ca8f9d2fe24103f460e5690d7
SHA18d459ed3df9accf2e4eaf96320488b1e537149fc
SHA2569979e8514c748b729ab4bd6cc4eb27cc9cda3549140992b64d656bdbc93f5d40
SHA512ce9c0e0a93df4ef3b5b6726a7d0a3b5ceb276f59141ea419a9a6a3bef4e6d633d4ce0bf477910a85829b06031fae68ffeddabd081d9400feae4e7d5b6dc30fbc