Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
2c67b874d8bb9677d10726910a01e360N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c67b874d8bb9677d10726910a01e360N.exe
Resource
win10v2004-20240802-en
General
-
Target
2c67b874d8bb9677d10726910a01e360N.exe
-
Size
162KB
-
MD5
2c67b874d8bb9677d10726910a01e360
-
SHA1
acbc312214a5a3a0dcf370252050009a38746fd0
-
SHA256
00b95ee317c9585a02c789b56ea01bc7b3e6a6d2cb3d9a081664e6e6dcd1cbbc
-
SHA512
d2dacc773f509311482d795991bee7a5e705611e5f40d2dc03aa38c72f8cbe92bbf0a2abb209dd31af2a95bb82b84417dc4246bf0a80812a1fbe1c77a61de414
-
SSDEEP
3072:DJEpqJJ8YQShlZdwm5RkRQre+aecf9eR2QtdiuRMLdxs7M+1u:VEpkJsShqmEa6xecf6ZSu2s7R1u
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 2c67b874d8bb9677d10726910a01e360N.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 2c67b874d8bb9677d10726910a01e360N.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 2c67b874d8bb9677d10726910a01e360N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c67b874d8bb9677d10726910a01e360N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2736 2c67b874d8bb9677d10726910a01e360N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2736 2c67b874d8bb9677d10726910a01e360N.exe 2720 2c67b874d8bb9677d10726910a01e360N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2720 2736 2c67b874d8bb9677d10726910a01e360N.exe 31 PID 2736 wrote to memory of 2720 2736 2c67b874d8bb9677d10726910a01e360N.exe 31 PID 2736 wrote to memory of 2720 2736 2c67b874d8bb9677d10726910a01e360N.exe 31 PID 2736 wrote to memory of 2720 2736 2c67b874d8bb9677d10726910a01e360N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exe"C:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exeC:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5798152d14877d2d6dc9b3cc84fe636fe
SHA1cf94044c7b93aa22adbd50bc0a98d44e3c8402f3
SHA256a3e2f2e71a06bf80c4449548aff96ba017f0de91d3205378d75dd614bf0cb639
SHA512424ea728c173d63f986377ce8d776f59ca2ac03c415b8c7549b42bcf3e25889f0406a0e9e2b80f88db935061ef410b7089e9ef76a4564d3163339f54004aa79c