Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
Resource
win10v2004-20240802-en
General
-
Target
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
-
Size
4.4MB
-
MD5
8dd793eadd752e13d9f5c9efd5971b20
-
SHA1
1343e4abfc01926f7b215b1558bed5246625bf68
-
SHA256
b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dac
-
SHA512
5d9ad58734bbf56ff8c40d733e9830f9c6803c667281172893249f0736bfd0455f3565aeda7ea7ab169081f6fac070ddd81c8c88dac1b75c02c8a387fb75230e
-
SSDEEP
49152:Svm2AC0d1XqrdryeJVfhSRSla7s2ZVe3MA7HlsBp7IswLVT5dVXeQqZUhh4r5VCB:emhd1Uryeis2ZgGp7yV7wQqZUha5jtSn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4816 B093.tmp -
Executes dropped EXE 1 IoCs
pid Process 4816 B093.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B093.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3532 wrote to memory of 4816 3532 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 82 PID 3532 wrote to memory of 4816 3532 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 82 PID 3532 wrote to memory of 4816 3532 b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe"C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\B093.tmp"C:\Users\Admin\AppData\Local\Temp\B093.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 2C13CC2F70593C34C28CAAE66A6170BC06979CD6ED60B0F87587722848169158F03793F2FB4E4DDE8F967C4796D3D9B6CD1FCF3091087369EC78731C593BAA7C2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5594851879f4bc352311d32d21c491c3e
SHA1ac98945049ae30f728e489094efe9b7f037cd660
SHA2568f7a51ced7fb8778c5bceef2e7bed87beb77397636a1b8d455b28e137906cfea
SHA5120efdd39a1d5ea5ae848e1a314be8f1ed015aec0adccfd0976ac3a8a5846f5542cc8ab9a35b6f680bc68128702398b7d5366fbba0f98f9f8a88a1003c6c9084e6