Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe
Resource
win10v2004-20240802-en
General
-
Target
cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe
-
Size
203KB
-
MD5
46933f437d9b705f2790e04df10508c0
-
SHA1
7454fc0b70c2a2fc2d86806c895b3202fb5abda3
-
SHA256
cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1
-
SHA512
c74545b2f9df116f25294eb8d65a025e70bd0a8bb637d46621da2b17cbc4469941008775c8d5895363c7329cceeff7e5a916a579ac78ac91b688993c52ee6154
-
SSDEEP
6144:+OuCALRYSq6rl4ax+Yh56OpJBypUkRJcz4gG1B78:+OLALaGrl1xHryvwFG1BA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2308 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2716 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2716 2308 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe 32 PID 2308 wrote to memory of 2716 2308 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe 32 PID 2308 wrote to memory of 2716 2308 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe 32 PID 2308 wrote to memory of 2716 2308 cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe"C:\Users\Admin\AppData\Local\Temp\cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exeC:\Users\Admin\AppData\Local\Temp\cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cfe3a2548d92673cfbec8c7384e857bd4b99200e2a9b63ccaf0a5b8456bf22c1N.exe
Filesize203KB
MD592a38c929e4801e213d4fd6471638e53
SHA1d7187357932ed8135f6e2e313e00143c66e9b9a4
SHA256086843c8aa5f7c1d3b89c936402c0dd4e75cc32e1449ce74c46b3409f8ef86e3
SHA51298c053593b98007376bc111a2e03fc2a1c6696efdf608fd75bc896cd5129352a960e7e363298eb8fd82ade189a8b3e0ecf34f0b894fa7ac9f74b8c2371e0af27