Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
30ea1bcdb6d4d177c5366921a8e7d1c0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
30ea1bcdb6d4d177c5366921a8e7d1c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
30ea1bcdb6d4d177c5366921a8e7d1c0N.exe
-
Size
1.6MB
-
MD5
30ea1bcdb6d4d177c5366921a8e7d1c0
-
SHA1
bb32b4c9da827ee1a73e0991196738a924bf4e16
-
SHA256
a0c8c5aea69de7ded4c67d3e0e300dd51fd5b54af62c298d6e01b0fc7e5def02
-
SHA512
1ce87ce5ad3b76ce50a03519c3136ce17035a4d610e0c0521d1d44e737cde397f45fbcb1589d0335ad43dc5879704710f12e5a86af427e3ffc86f90449eede2b
-
SSDEEP
24576:gawwKusHwEwS2hGqKyxCqzO6I6h6gEGe/NIsWvMyCShxvB:wwREDpQ4Shv2NuMsvB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 636 30ea1bcdb6d4d177c5366921a8e7d1c0N.tmp -
Loads dropped DLL 1 IoCs
pid Process 636 30ea1bcdb6d4d177c5366921a8e7d1c0N.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ea1bcdb6d4d177c5366921a8e7d1c0N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ea1bcdb6d4d177c5366921a8e7d1c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 636 4632 30ea1bcdb6d4d177c5366921a8e7d1c0N.exe 92 PID 4632 wrote to memory of 636 4632 30ea1bcdb6d4d177c5366921a8e7d1c0N.exe 92 PID 4632 wrote to memory of 636 4632 30ea1bcdb6d4d177c5366921a8e7d1c0N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ea1bcdb6d4d177c5366921a8e7d1c0N.exe"C:\Users\Admin\AppData\Local\Temp\30ea1bcdb6d4d177c5366921a8e7d1c0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\is-8CTVC.tmp\30ea1bcdb6d4d177c5366921a8e7d1c0N.tmp"C:\Users\Admin\AppData\Local\Temp\is-8CTVC.tmp\30ea1bcdb6d4d177c5366921a8e7d1c0N.tmp" /SL5="$6025C,865850,776192,C:\Users\Admin\AppData\Local\Temp\30ea1bcdb6d4d177c5366921a8e7d1c0N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3952 /prefetch:81⤵PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
3.0MB
MD538928652c4106fac0354420e2c20b081
SHA13360b0d59561fb4fc88f0a1b9d52b8344d26e3c0
SHA2564ce16bf95263e42c35dc6ac6411f393f511f623deeb98b0198e46a649a41e068
SHA512b51cc4491e6398363403cfa88d821322be627f45bbcb8faa2705342cdd5579d0d54e78d0b2c139a975f084749142565a7f9ab535bc9fc50561dd73c5357b8126