Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
Resource
win10v2004-20240802-en
General
-
Target
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
-
Size
7.8MB
-
MD5
22877c8c09c57b7030f00482c5df5d50
-
SHA1
4a8031a998528415d5249840dd4061919846553a
-
SHA256
e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39
-
SHA512
959fb957fdcced29edeaf14371fabaafb04c1e37610069e29aeb8dcdcd0bea7e10112867760aa48e4fe4647459e9d9aabbf133b722c734a67d703ce706f382a2
-
SSDEEP
98304:emhd1UryeHZNLJbT1OzVmNh5orPV7wQqZUha5jtSyZIUb:elnZdlT1iV2bor2QbaZtli
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 532 8E36.tmp -
Executes dropped EXE 1 IoCs
pid Process 532 8E36.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8E36.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 532 4004 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 82 PID 4004 wrote to memory of 532 4004 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 82 PID 4004 wrote to memory of 532 4004 e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe"C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\8E36.tmp"C:\Users\Admin\AppData\Local\Temp\8E36.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe E8CF2BD0E5A90ADC205BEA3BBF767FCEFA4DEB0AD0A093E5990E2CFA7406B53D6E4D1BA8970FA8684CC24BCEBAEDBA730AA381065C27285A5E07F6337AB670FD2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD530ddbe43f46a1840ee37ee871a15eb19
SHA17fbc60e178f376efc3c3820479dd4b24080560e1
SHA256933954a68de5cef7035da8c291e221998569c6859499089f99d37f4cc7a4db0c
SHA5128bdb06b9db655ccbd10278027d3f58929d07518fb838381da332ed5ccb048b1d90e4642804fc1d5fcdbe61ffeb08978255b5f88f654aeaa0dcba88e6c7725d12