Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
Resource
win10v2004-20240802-en
General
-
Target
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
-
Size
4.4MB
-
MD5
8dd793eadd752e13d9f5c9efd5971b20
-
SHA1
1343e4abfc01926f7b215b1558bed5246625bf68
-
SHA256
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dac
-
SHA512
5d9ad58734bbf56ff8c40d733e9830f9c6803c667281172893249f0736bfd0455f3565aeda7ea7ab169081f6fac070ddd81c8c88dac1b75c02c8a387fb75230e
-
SSDEEP
49152:Svm2AC0d1XqrdryeJVfhSRSla7s2ZVe3MA7HlsBp7IswLVT5dVXeQqZUhh4r5VCB:emhd1Uryeis2ZgGp7yV7wQqZUha5jtSn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 D134.tmp -
Executes dropped EXE 1 IoCs
pid Process 2352 D134.tmp -
Loads dropped DLL 2 IoCs
pid Process 2124 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 2124 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2352 2124 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 30 PID 2124 wrote to memory of 2352 2124 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 30 PID 2124 wrote to memory of 2352 2124 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 30 PID 2124 wrote to memory of 2352 2124 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe"C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\D134.tmp"C:\Users\Admin\AppData\Local\Temp\D134.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe F861556D260C3444907052F603FA38B6BD43249BF7A3FAF7AF893BDEE6623294DC28C0EDD398AB984EE32275CD22AE2E3A68630855BB2B69F68DDA877D998A912⤵
- Deletes itself
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD54caf255c8d002bfb2a8d91df26f7fe55
SHA1b3ae485cca5fe890b2c98ab0c24bd7c62bd37409
SHA2568e885bf594a69ae79dc4d5350906e033d479959c8234a23713b294cf97b9352c
SHA512735e961f497af315e31cdecd178d60c5faf39a4ea8c3590f39c8dcad59576996abab763d734c8cec4dad9f33d7e5ac84476582ff22dadc2659983ffdbf42b9e3