Analysis
-
max time kernel
93s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
9d911c5fd34ee0bb61d7d5c851a02960N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d911c5fd34ee0bb61d7d5c851a02960N.exe
Resource
win10v2004-20240802-en
General
-
Target
9d911c5fd34ee0bb61d7d5c851a02960N.exe
-
Size
616KB
-
MD5
9d911c5fd34ee0bb61d7d5c851a02960
-
SHA1
8153b707571f033f7256834b4d57a88717da7bd8
-
SHA256
0e260cb21e0326c4febba9914702be1c6b4f546d8134843cf8430c07e236a594
-
SHA512
b4e82085e5c4813d5973ce05636e39abbac997c2106085a093d985fc96a3c305b84b0ba20f8d77b30d0db018e480a8808f317ac605e5c6b4652339179aac5c5f
-
SSDEEP
12288:0W8m+95tHfF2mgewFx56wj0F3oRgms/E1kfgjdkAG+61hq5:0W8z95tdbgfx5Rj0WR3cfgjTG+61hq5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 3E19.tmp -
Executes dropped EXE 1 IoCs
pid Process 2660 3E19.tmp -
Loads dropped DLL 1 IoCs
pid Process 3028 9d911c5fd34ee0bb61d7d5c851a02960N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d911c5fd34ee0bb61d7d5c851a02960N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3E19.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2660 3E19.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2660 3028 9d911c5fd34ee0bb61d7d5c851a02960N.exe 30 PID 3028 wrote to memory of 2660 3028 9d911c5fd34ee0bb61d7d5c851a02960N.exe 30 PID 3028 wrote to memory of 2660 3028 9d911c5fd34ee0bb61d7d5c851a02960N.exe 30 PID 3028 wrote to memory of 2660 3028 9d911c5fd34ee0bb61d7d5c851a02960N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d911c5fd34ee0bb61d7d5c851a02960N.exe"C:\Users\Admin\AppData\Local\Temp\9d911c5fd34ee0bb61d7d5c851a02960N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\3E19.tmp"C:\Users\Admin\AppData\Local\Temp\3E19.tmp" --pingC:\Users\Admin\AppData\Local\Temp\9d911c5fd34ee0bb61d7d5c851a02960N.exe 57F3AD19C7634DDFDF6D1E76E74E327819C23AEC5DF903B3B014D6C605B3D605C61BA6EEA576EAFB4D6DB2D4CE9D3159AD6B1F41AD41C7AF2478DFE506211E6E2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
616KB
MD53eb1d6974db7e009bed39ca6813828ef
SHA1437cf40fd4ebfab470042d8da245b703babfbd7b
SHA2560e621cc7649f846a0e0b57df9e559f6ef57a2cc44f83151fca2427613870ec3b
SHA5123f42a71a0f27a55a7eb3cbf19bd1610ba2bde93c5b28f62900a8da59bf4d2ac962f8d20355eba7932475b009b59a03404083a8f4d06b797f3de6d72d457a31fc