Analysis
-
max time kernel
107s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 00:24
Behavioral task
behavioral1
Sample
47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe
Resource
win10v2004-20240802-en
General
-
Target
47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe
-
Size
130KB
-
MD5
881d6c7b2782b23e76b64b901a0cc580
-
SHA1
6d5acfad905473a68d294cb2901c1794a001da13
-
SHA256
47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55b
-
SHA512
059e06a04eace1ecee35e87f312d23971c61103b67617713a070d6d1060127573b8aa1b1933b3026bd40d127fefe0c5c14a20001652d691e7c8133eebb4fd939
-
SSDEEP
1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmX:SKQJcinxphkG5Q6GdpIOkJHhKRyOXK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 -
resource yara_rule behavioral1/memory/2844-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2844-72-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2844-78-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x001100000001866e-798823.dat upx behavioral1/memory/301696-798825-0x00000000026B0000-0x00000000026D3000-memory.dmp upx behavioral1/memory/295356-828628-0x0000000000400000-0x0000000000423000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 301696 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32 PID 2844 wrote to memory of 301696 2844 47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe"C:\Users\Admin\AppData\Local\Temp\47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe"C:\Users\Admin\AppData\Local\Temp\47e38cf2b416787b39ef009b5ce401c60ec6da7bb2289a397065898bf8c0f55bN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:301696 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QEHDB.bat" "3⤵PID:25596
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v ".Flasfh" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe" /f4⤵PID:295924
-
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"3⤵PID:295356
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5da0cbe87b720a79b294147ed6a4b98be
SHA1ebf0dc9efd7a12cb192e355cda87546acb4ab360
SHA2567ccfeff356fdccc9145bd1e263aa1c56360ca7b6552ed5a5665c596d02a627ed
SHA512f55c4a3d24d2f11db5eda3c816d1cd3b8804a171a7bf715b13d60788247fbb352eafaa5bd4e0a8086c1013396be0a48c7bdb904ab0f974fa0c75e81e3d365acc
-
Filesize
130KB
MD53ef5f63eb2ead249b73581cd283c1634
SHA1c0dc208a2b20be597feee98dc5919e7ee97ce081
SHA25606d28d145baed64b66945f44805cef606a809f75e96b69f424487f7256acf36c
SHA512f1a18daf5f2cd65d8bb05eeff3d793fd9a4756219017a8f3e429b7793508c9836309393725f0df74b45b6f45a51e5b145962b855b93ea9b19cae187d6a807eb8