Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
Resource
win10v2004-20240802-en
General
-
Target
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
-
Size
7.8MB
-
MD5
22877c8c09c57b7030f00482c5df5d50
-
SHA1
4a8031a998528415d5249840dd4061919846553a
-
SHA256
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39
-
SHA512
959fb957fdcced29edeaf14371fabaafb04c1e37610069e29aeb8dcdcd0bea7e10112867760aa48e4fe4647459e9d9aabbf133b722c734a67d703ce706f382a2
-
SSDEEP
98304:emhd1UryeHZNLJbT1OzVmNh5orPV7wQqZUha5jtSyZIUb:elnZdlT1iV2bor2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 9C9D.tmp -
Executes dropped EXE 1 IoCs
pid Process 1636 9C9D.tmp -
Loads dropped DLL 2 IoCs
pid Process 236 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 236 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 236 wrote to memory of 1636 236 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 30 PID 236 wrote to memory of 1636 236 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 30 PID 236 wrote to memory of 1636 236 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 30 PID 236 wrote to memory of 1636 236 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe"C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\9C9D.tmp"C:\Users\Admin\AppData\Local\Temp\9C9D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 74B7CAC37081524104E7C83B51D96AA48135D1A2391377232B9CC11E5D649DA58982F073F8C59DB52FCECC9A18E0D8C319DA772F39A5B0B48FB85BFD7A190B1F2⤵
- Deletes itself
- Executes dropped EXE
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD56eda9896ca49ff7bcb98c3ef6db422d6
SHA1f4382ea0ff6d193b1285bdc0db6992dc878378c4
SHA256578119089f49a9ff9794578d522964cd65aa376e96922bc81415dab2df53c5fa
SHA5122bee888dd857a0593ab982891d3acdf8e1155375f2d38308499bc7ba8e5907a0ea0a2e40322cc589ff0a0cbbb3025bbca0273c68c1e40469e8c7d104a4eccd6f