Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
Resource
win10v2004-20240802-en
General
-
Target
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
-
Size
816KB
-
MD5
b1976b6919e2399ea79000c8468a055c
-
SHA1
3a492e7c0fde824d07d71f83577eaf9f2193c137
-
SHA256
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2
-
SHA512
7f21bb33c6271d50c6ae78409a30e1f141cee6fec81f7ea1d0aa91d483a8866c664aa79f9201bdc8b0dca24e7d68a9dce00158681a2177c00ecdab1872ed9e89
-
SSDEEP
24576:DY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9Y:c3XZynV4oDabuWbDQOcIxJJ9Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 1C0F0A0A120F156A155F15F0D0C160F0E160D.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 2404 1C0F0A0A120F156A155F15F0D0C160F0E160D.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C0F0A0A120F156A155F15F0D0C160F0E160D.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2404 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 30 PID 1680 wrote to memory of 2404 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 30 PID 1680 wrote to memory of 2404 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 30 PID 1680 wrote to memory of 2404 1680 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe"C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\1C0F0A0A120F156A155F15F0D0C160F0E160D.exeC:\Users\Admin\AppData\Local\Temp\1C0F0A0A120F156A155F15F0D0C160F0E160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD50676fae5274ebd320a581f0a9a79a4f1
SHA10e14d38b840aa23cad4325f424536c8a4874c5f4
SHA25625bdb8820c0d523334fafc3dcbd77b769fd31490ebbfae62db75a7fa1021338e
SHA512cf6c908388953eafe3e3d8cd5ff88647c1f99cd03ae57bbc0ed56288cce061489e286ca2b029eb138787428dfc537e17aaaa944a4f0f4f1320db2f52c7c2c3f2