Analysis
-
max time kernel
140s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
CustomRP.1.17.28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CustomRP.1.17.28.exe
Resource
win10v2004-20240802-en
General
-
Target
CustomRP.1.17.28.exe
-
Size
6.3MB
-
MD5
870ab8636ad23af5808c704cbb1a9655
-
SHA1
ab4c1a35cb12d9e7c6d37fb71fdff0c3864867ac
-
SHA256
0d7423a330f992c9dc0069891114c708d39da9a2a98a98cb5b29eb35f02922a9
-
SHA512
0092b6c533b6983a7bf27c22764a1a2f21b4ec9296c488f6849545a2d1ab7ca41fc12267545a4819f0ad82cbc0ff31788f824c5604d787030f8d66e4340e6a6d
-
SSDEEP
196608:ONvQVM6bSbs8gIiNR5jxNLT5TYYjVO5KtTHCx7hI:uQrSbs8gImNLT5RZOotH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4896 CustomRP.1.17.28.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CustomRP.1.17.28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CustomRP.1.17.28.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4896 4748 CustomRP.1.17.28.exe 82 PID 4748 wrote to memory of 4896 4748 CustomRP.1.17.28.exe 82 PID 4748 wrote to memory of 4896 4748 CustomRP.1.17.28.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\CustomRP.1.17.28.exe"C:\Users\Admin\AppData\Local\Temp\CustomRP.1.17.28.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\is-CQJS5.tmp\CustomRP.1.17.28.tmp"C:\Users\Admin\AppData\Local\Temp\is-CQJS5.tmp\CustomRP.1.17.28.tmp" /SL5="$F0068,5498552,1081856,C:\Users\Admin\AppData\Local\Temp\CustomRP.1.17.28.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5773cadc010f451565e4e711023f9b95b
SHA16b68d46d6bdf5011fd1506f4939cd1d0d44b424d
SHA256bd8e162b8c213a0dbbc614397f3f35fd3189386ce02caa91b9f907e3edcaa7b6
SHA5121e2f900f79c5f29dc57fd3de422fabe723c7bb55f9e7e2d5d17eb8a525710577866e92bf482bfe6acba791aed2436e30ec1bdbf34bc82bec49be62fbad1dcf09