Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
Resource
win10v2004-20240802-en
General
-
Target
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
-
Size
5.4MB
-
MD5
c21f40b89a3f2dcf6c83964c12e63edc
-
SHA1
4528ae4d6fd9caf304af2579f405af8ae11d4d19
-
SHA256
fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e
-
SHA512
f3586424d545212f4347178302200a3123cf77b55d3fc7a7c701bd6562041e094c435328f5eaaa4b0e71b4b05ca3a0718af51d6629919007fb2a34c37fa60734
-
SSDEEP
98304:emhd1UryeKdQ733aTeUyRnV7wQqZUha5jtSyZIUh:el4Q760p2QbaZtliU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1000 AFF7.tmp -
Executes dropped EXE 1 IoCs
pid Process 1000 AFF7.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AFF7.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1000 1852 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 82 PID 1852 wrote to memory of 1000 1852 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 82 PID 1852 wrote to memory of 1000 1852 fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe"C:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\AFF7.tmp"C:\Users\Admin\AppData\Local\Temp\AFF7.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe C089E413D5820077574B73C9A214EA3F8A76B534101D178ECD109B87FD34CCDAFB350449F912C30893063BC5E98B9524638D81E74DCD582BC722443F48E7698B2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5a1f0227e8498e7bbbd50a06451338657
SHA18abc4f7de7870a0db234fc439b883a59305af80b
SHA2567e58be9e4cab3693ce9ac86e6c4fc90204441c56a68ed80337d301b4001631c1
SHA512ecc638f9674d25a7d5b8741575687a0503c45b6e995042e25577272be6291adc129fe0d4ff3ae4cd1707aeccdf42dd6278fc7309261d985929f9e2b24ddb376e