Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe
Resource
win10v2004-20240802-en
General
-
Target
6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe
-
Size
90KB
-
MD5
cbc9b9636d67acb91b4bbd041ba69d20
-
SHA1
df7b0283b2f53e43194ee756b9f97ecc1f2128ee
-
SHA256
6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8
-
SHA512
e938ca63570988b6f0d44ed3a7fcd3d0b43003b62bd38989be6d4f27402d08485c14c09d54aa039770178126340511e0631fbab898cebedb8754282c152d7f8c
-
SSDEEP
1536:H5QHVbynWtqID23ZoTz/gbVfZ48yFfkEbzmpebcheInWKl1P8KnCMJTE/4zJ:ZeVbJjdYb5ChVjzojeIWKlCMJMiJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1772 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1992 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe 1772 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1772 1992 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe 83 PID 1992 wrote to memory of 1772 1992 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe 83 PID 1992 wrote to memory of 1772 1992 6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe"C:\Users\Admin\AppData\Local\Temp\6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exeC:\Users\Admin\AppData\Local\Temp\6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6f3ab2cd7dcaafcbe1297952491a316ce29cf564a5fd0e0b5f3faadf459c3aa8N.exe
Filesize90KB
MD53c4c9527b1de4e1aad84cf152f4230a4
SHA1345d07f09223f5528d9514a2d5538af906e6f67e
SHA256c6c22704d1589026e6308eaab061808393c6dfff09121b9c629da64248ba9725
SHA51210167dc4adc1ed8628b81de0ec87138818438d29039b2da9feab1ed5b21168a087d10663c34e3034075b066e8c93c1a0a0e8b179dab145e15183e6276e30662c