Analysis
-
max time kernel
96s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
c9287edccf6be24de56eb7708abb25b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9287edccf6be24de56eb7708abb25b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c9287edccf6be24de56eb7708abb25b0N.exe
-
Size
94KB
-
MD5
c9287edccf6be24de56eb7708abb25b0
-
SHA1
d1c1bf99ddab18ecf3ee9ecd20f96a7442f1d2a5
-
SHA256
554b8acb0c1bacea06d4e35d1eab0dc578ff7b7806204344258e231b7af9daa2
-
SHA512
3ca855e67f43e8ae77dd3b693377597c68cda8c9bf65b04e5a384d5b7134078d9fc56e8c04068dc0133d653d4eee1be6fe5ce30ec295491b2b394d0ccfc52e83
-
SSDEEP
1536:g8fF0XrwMuvzINRhEONEddm75Jl8m3mhaIKknCgkYlf6AX9dhpCDjDx+7goRAHZX:OrTVNRyyYgJlgNf6mdhOQ7goRAHZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4900 c9287edccf6be24de56eb7708abb25b0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 c9287edccf6be24de56eb7708abb25b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9287edccf6be24de56eb7708abb25b0N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4980 c9287edccf6be24de56eb7708abb25b0N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4980 c9287edccf6be24de56eb7708abb25b0N.exe 4900 c9287edccf6be24de56eb7708abb25b0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4900 4980 c9287edccf6be24de56eb7708abb25b0N.exe 85 PID 4980 wrote to memory of 4900 4980 c9287edccf6be24de56eb7708abb25b0N.exe 85 PID 4980 wrote to memory of 4900 4980 c9287edccf6be24de56eb7708abb25b0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9287edccf6be24de56eb7708abb25b0N.exe"C:\Users\Admin\AppData\Local\Temp\c9287edccf6be24de56eb7708abb25b0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\c9287edccf6be24de56eb7708abb25b0N.exeC:\Users\Admin\AppData\Local\Temp\c9287edccf6be24de56eb7708abb25b0N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD566eb6bf116a1855fb72da1c297ab0d58
SHA1120bff711524959e7e8c47504b62e2c77537b56f
SHA25694abc03a1490c8ec5da51e327fa9981ea8de9d2f3c7f6f77f90a616215a5ec80
SHA512d13407cb9483d482b440b254cf2891e2b69b001e1d4add3ce065551b5186e322a52d5dde51152660f68136352b485ca75baa544c4838c0299619c894332bf107