Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
Resource
win10v2004-20240802-en
General
-
Target
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
-
Size
816KB
-
MD5
b1976b6919e2399ea79000c8468a055c
-
SHA1
3a492e7c0fde824d07d71f83577eaf9f2193c137
-
SHA256
c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2
-
SHA512
7f21bb33c6271d50c6ae78409a30e1f141cee6fec81f7ea1d0aa91d483a8866c664aa79f9201bdc8b0dca24e7d68a9dce00158681a2177c00ecdab1872ed9e89
-
SSDEEP
24576:DY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9Y:c3XZynV4oDabuWbDQOcIxJJ9Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 1F0C0C0C120A156D155D15E0E0B160B0B160B.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1912 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 2544 1F0C0C0C120A156D155D15E0E0B160B0B160B.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1F0C0C0C120A156D155D15E0E0B160B0B160B.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2544 1912 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 82 PID 1912 wrote to memory of 2544 1912 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 82 PID 1912 wrote to memory of 2544 1912 c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe"C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\1F0C0C0C120A156D155D15E0E0B160B0B160B.exeC:\Users\Admin\AppData\Local\Temp\1F0C0C0C120A156D155D15E0E0B160B0B160B.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD5569c4db7d8d328d94dbbde53b7913fe7
SHA19cea10acdbfc2d32d65a2436953f414b44959a87
SHA25624222dac57787ba41748445a1472fe6e8997e505fdc6e2bd00ec7d5c3803698d
SHA51293996f830ba1a4caa04c1ed6fcd525f1f9ba624d7f5297ea1551e7c56d902e1651337355d3bd50f7af61e2d0f7aca9d7ff77ddd9e2d2c910876d30a7a16b0de8