Analysis
-
max time kernel
196s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30/09/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe
Resource
win10-20240404-en
General
-
Target
7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe
-
Size
1.9MB
-
MD5
ae85198b4e96994847b851ba2360a2e5
-
SHA1
7b0217e10e74c3d20d46b776c64f49e81dc8d8f2
-
SHA256
7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713
-
SHA512
ce58b0f4faaa79266679c767b5e03f1990f822bfc81286e99bd8a0890bc1b07c9740ce65cb08ca6380e6ba285dffe97f00748d46ddfee1e1fb00bf135fc1071d
-
SSDEEP
49152:XPlJjt7Z2v0GKAivgCuB70kMhO2SD+/3jwtRd0vnQiC:XNJhS0GKAivgZ70xOxwcPd0IiC
Malware Config
Signatures
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api64.ipify.org 7 api64.ipify.org 9 ipinfo.io 10 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4604 set thread context of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74 PID 4604 wrote to memory of 4476 4604 7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe"C:\Users\Admin\AppData\Local\Temp\7451a7613a173ab1c80d664892cb744c7f09925dedf9adb964b31861b74cb713.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4476
-