Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
Resource
win10v2004-20240802-en
General
-
Target
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
-
Size
5.4MB
-
MD5
c21f40b89a3f2dcf6c83964c12e63edc
-
SHA1
4528ae4d6fd9caf304af2579f405af8ae11d4d19
-
SHA256
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e
-
SHA512
f3586424d545212f4347178302200a3123cf77b55d3fc7a7c701bd6562041e094c435328f5eaaa4b0e71b4b05ca3a0718af51d6629919007fb2a34c37fa60734
-
SSDEEP
98304:emhd1UryeKdQ733aTeUyRnV7wQqZUha5jtSyZIUh:el4Q760p2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2004 8640.tmp -
Executes dropped EXE 1 IoCs
pid Process 2004 8640.tmp -
Loads dropped DLL 2 IoCs
pid Process 2076 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 2076 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2004 2076 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 30 PID 2076 wrote to memory of 2004 2076 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 30 PID 2076 wrote to memory of 2004 2076 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 30 PID 2076 wrote to memory of 2004 2076 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe"C:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\8640.tmp"C:\Users\Admin\AppData\Local\Temp\8640.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 54DE0458A5F7AB6F7DD7665BE21A0947DDF99DED3876D1606D153EC66A3ED5ADC29DAC8D355CF3B2593CC2B9562CE8E96D6EDCBF2B228DBF5E339F932ED304392⤵
- Deletes itself
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5d9f1d5795a726f23d73706974b69eb3a
SHA1b2c75053045416b1a269ab5a757f68d7244c905f
SHA256cd328633ba04cd409ee8bed1bc5be6817463b73eee84dd54e2356a7478a71d40
SHA51296b2b7075c0eb011692c39f8e74da11f89914cf4d66d95e1fba67dbdfa844b3e157f4c00ce2c14b55864ae72c1feac4dba9e794271cf1174ae5adb0fdeb90f83