Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe
Resource
win10v2004-20240802-en
General
-
Target
46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe
-
Size
32KB
-
MD5
0feac4769a979c684f50ac1eb0fb7a00
-
SHA1
9b5f58a1c27d3570c9a324578b0e202a59a5d3ed
-
SHA256
46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749
-
SHA512
430021aa36770be1d363a90363f89b47e342b772081be8079709a0b6e99cfcfb8097c38329c12b23100358624ca40770a109f0eb2a3bf8e2ad2e3d4cf282935a
-
SSDEEP
768:/8sJAnZCQBwuUuequ7UUK2xgl4sVZXLpbL:/8sMnlequpKwgrTXLZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1244 justupdater.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language justupdater.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30 PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30 PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30 PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30 PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30 PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30 PID 2544 wrote to memory of 1244 2544 46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe"C:\Users\Admin\AppData\Local\Temp\46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\justupdater.exe"C:\Users\Admin\AppData\Local\Temp\justupdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5c2fac5561b5509fbfdfb2a4a7e385eee
SHA1756205bd9bf16a2402e64781ab426a1b4dcde2ba
SHA25665956ba2b5dcec963704a40fb4860457dc98eb0949f6f90835b9fe9b575bbbb7
SHA512571ef9ce4e8ba8418bf6cacaa44ab3e07cf4e69fb12de9b64eb43624a4d5253657a78526f667ec6eaa8709e4e8a655f9f3c599c25ec52427ca8abf5acb724ce8