Analysis
-
max time kernel
81s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe
Resource
win10v2004-20240802-en
General
-
Target
dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe
-
Size
411KB
-
MD5
63244ad2c475ca4b00e42a89fba15b50
-
SHA1
563ffc4d4014041183fcb5b8ab8f966faa8531ee
-
SHA256
dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2
-
SHA512
977fde8141dfdc4fa36e5f03ce519bf166a7db84c75e01316cea325a350e1bae0d08aef5d9f447e4ef4730d31b6d67517b1eb72f35fbbec3bea2884c09a65303
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mF9vLy1TFG2RNyEwPpXz0Ym+58T7qHI:gZLolhNVyEmLy3yEcZAYm+5m7qHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 6A19.tmp -
Executes dropped EXE 1 IoCs
pid Process 2832 6A19.tmp -
Loads dropped DLL 1 IoCs
pid Process 2232 dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6A19.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2832 6A19.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2832 2232 dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe 30 PID 2232 wrote to memory of 2832 2232 dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe 30 PID 2232 wrote to memory of 2832 2232 dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe 30 PID 2232 wrote to memory of 2832 2232 dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe"C:\Users\Admin\AppData\Local\Temp\dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\6A19.tmp"C:\Users\Admin\AppData\Local\Temp\6A19.tmp" --pingC:\Users\Admin\AppData\Local\Temp\dbb71deafdd0f41421f1530ae31e9365f71388c6076ff281a6ed7fdce04cf4c2N.exe C5CF02A49D56E47857A3D87ECAED469CBC8AFE100175CC2A061C044178A65703FC93010D6388E8C95C3D38C4501B042B8B4A7CF508767AA626A695F97D0196C12⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5f3f25583971af2d4544983a6bb08c16a
SHA1312d0723df4a412693dbdc0a785330824e5c2c4b
SHA256288c19aabdb7aae030b88d13116a588014197349d631a0561930e481ce6e185a
SHA512dc159efaa6b016230a9f336fe61e80ea6dbd6528675d227e22cdf58fd4bcc407c28c77127e9be75826ffb3a2b5ff9cc83a904209040844da6c46a4952b514452