Analysis
-
max time kernel
111s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
d81fec2196bf6d247ca7d9538c58a440N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d81fec2196bf6d247ca7d9538c58a440N.exe
Resource
win10v2004-20240802-en
General
-
Target
d81fec2196bf6d247ca7d9538c58a440N.exe
-
Size
36KB
-
MD5
d81fec2196bf6d247ca7d9538c58a440
-
SHA1
9fcb71fee854527117355e6db3771b102fb5c96a
-
SHA256
8b47c49a96272bcd2ffdb1543a3e52607910c4f01e6ce17f10fa3960d8c79fbe
-
SHA512
7ddfbe206a87932cd91849ad37d0b7b2e459f9bd6009c14eda144f7df012bc93a7c3e2c743281b4a4461c910f2b64de52af814d891a50984d96e7b5b0c201c36
-
SSDEEP
768:DlcTwpQJkYYTgOnHBqQTZqDsQw6AL7oh2q7vm6PrP2578Nkb2:h8wyJnYEOH9ZqDw8h3bzPD2me2
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4108 set thread context of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d81fec2196bf6d247ca7d9538c58a440N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 772 d81fec2196bf6d247ca7d9538c58a440N.exe 772 d81fec2196bf6d247ca7d9538c58a440N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86 PID 4108 wrote to memory of 772 4108 d81fec2196bf6d247ca7d9538c58a440N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d81fec2196bf6d247ca7d9538c58a440N.exe"C:\Users\Admin\AppData\Local\Temp\d81fec2196bf6d247ca7d9538c58a440N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\d81fec2196bf6d247ca7d9538c58a440N.exe"C:\Users\Admin\AppData\Local\Temp\d81fec2196bf6d247ca7d9538c58a440N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-