Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
646ae9a4af1b258977d30f8558c70520N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
646ae9a4af1b258977d30f8558c70520N.exe
Resource
win10v2004-20240802-en
General
-
Target
646ae9a4af1b258977d30f8558c70520N.exe
-
Size
34KB
-
MD5
646ae9a4af1b258977d30f8558c70520
-
SHA1
8d23625513d4da1839e0bc8ad7401a80a85cb217
-
SHA256
a50c73a7de211c793ec53f73f52591cd0057d6c61cb92644fc7e79cf9cee70ac
-
SHA512
a3193b94a71222eb3ca6b606e081d4e8b423b57b8d42fcd11849bd6d5fd2d4ab0d5b09c6d0347e3ecfda66c59d64c4c990d7d5c0143aff01e6a089d903694570
-
SSDEEP
384:DLR7iSYIwM+6GyXzQNSOwOmOzO6iQspWGqYx1jYCKt7VpEi6xX+J3FAFtMF:DLR7ix70zQozpW7YYCqgi2y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2848 lasis.exe -
Loads dropped DLL 2 IoCs
pid Process 2732 646ae9a4af1b258977d30f8558c70520N.exe 2732 646ae9a4af1b258977d30f8558c70520N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 646ae9a4af1b258977d30f8558c70520N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lasis.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2848 2732 646ae9a4af1b258977d30f8558c70520N.exe 30 PID 2732 wrote to memory of 2848 2732 646ae9a4af1b258977d30f8558c70520N.exe 30 PID 2732 wrote to memory of 2848 2732 646ae9a4af1b258977d30f8558c70520N.exe 30 PID 2732 wrote to memory of 2848 2732 646ae9a4af1b258977d30f8558c70520N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\646ae9a4af1b258977d30f8558c70520N.exe"C:\Users\Admin\AppData\Local\Temp\646ae9a4af1b258977d30f8558c70520N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\lasis.exe"C:\Users\Admin\AppData\Local\Temp\lasis.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5d64a2fa5b52c9fa49dc27a83a13aedb9
SHA13222fc5b5bedf7da2affca451578b3fc59bc9869
SHA2561372d47cc647d9592798423eec9c120a67e6caecb15bd9b392ca9db1bea458b2
SHA51231bed442b068bf7f7299a63cc161550ec43027766fdf9ba0107329cc769ed345467f72af8962c449c1ed3232d781f8b2cee00c9e9738f878d23498d48fda752b