Analysis
-
max time kernel
97s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
2c67b874d8bb9677d10726910a01e360N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c67b874d8bb9677d10726910a01e360N.exe
Resource
win10v2004-20240802-en
General
-
Target
2c67b874d8bb9677d10726910a01e360N.exe
-
Size
162KB
-
MD5
2c67b874d8bb9677d10726910a01e360
-
SHA1
acbc312214a5a3a0dcf370252050009a38746fd0
-
SHA256
00b95ee317c9585a02c789b56ea01bc7b3e6a6d2cb3d9a081664e6e6dcd1cbbc
-
SHA512
d2dacc773f509311482d795991bee7a5e705611e5f40d2dc03aa38c72f8cbe92bbf0a2abb209dd31af2a95bb82b84417dc4246bf0a80812a1fbe1c77a61de414
-
SSDEEP
3072:DJEpqJJ8YQShlZdwm5RkRQre+aecf9eR2QtdiuRMLdxs7M+1u:VEpkJsShqmEa6xecf6ZSu2s7R1u
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 2c67b874d8bb9677d10726910a01e360N.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 2c67b874d8bb9677d10726910a01e360N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c67b874d8bb9677d10726910a01e360N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 2c67b874d8bb9677d10726910a01e360N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 2c67b874d8bb9677d10726910a01e360N.exe 3068 2c67b874d8bb9677d10726910a01e360N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3068 2168 2c67b874d8bb9677d10726910a01e360N.exe 86 PID 2168 wrote to memory of 3068 2168 2c67b874d8bb9677d10726910a01e360N.exe 86 PID 2168 wrote to memory of 3068 2168 2c67b874d8bb9677d10726910a01e360N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exe"C:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exeC:\Users\Admin\AppData\Local\Temp\2c67b874d8bb9677d10726910a01e360N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD50b9585fc8cf851c86443f8fb55c54bd5
SHA1e4a174c906fdf080289ec0d3a02e3ef4c3270784
SHA256a941d33d97d12aa3acaf134f7f0e895e609e0a36c344126c0f04d931bfb4d362
SHA512c4c786987c0456b70ea316668c804888428db825fd8af705c0eb8b2927e22892ab0f0496ce6c0577f6490093d864fad7650b21a21534186dc6f822b1b68d4963