Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 13:06
Behavioral task
behavioral1
Sample
49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520N.exe
Resource
win7-20240704-en
General
-
Target
49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520N.exe
-
Size
8.9MB
-
MD5
91bdc97e027a4a80f762074c05b33330
-
SHA1
6b9a2c7c0b779a32123b674a52c8883170de8568
-
SHA256
49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520
-
SHA512
84f147edaacfe04a3bb598bbae2e695de522f02934dd93097a5b15ad2a40e568da8724afa5882ffe4f0cf1fbee993e39a7d327de41883ad46cf4f85fd7f30bfb
-
SSDEEP
196608:RzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzX:Rzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1912 svrwsc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520N.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe -
resource yara_rule behavioral2/memory/1668-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/files/0x0003000000022ab1-5.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520N.exe"C:\Users\Admin\AppData\Local\Temp\49ac47c8b25fbb5b72bc49498af64f5a55b341a53d634c3953ebe90779536520N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1668
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.1MB
MD56cc9f3575e2918e0b535e7bfc82a211c
SHA197792d240fbed6d1706e97f3b7e03a211dc2917c
SHA2563bd26c40b6f0786e68e6ac30432ed5348712080797c5a4228059198390b51bb0
SHA512eef39811e9aca88eeab0cfc0eb1c81c13d717ace72c10ab9f2c4293377b6c9be2e5f00b2effd260f2bb8f537f8d78caf43934625aacd11a4b03a52c7249b9534