Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe
Resource
win10v2004-20240802-en
General
-
Target
4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe
-
Size
204KB
-
MD5
bb0ba6fe9506b7f1703f1c54de311290
-
SHA1
261a744247fa4fa16fc8a24ce1f79f3626076c42
-
SHA256
4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5
-
SHA512
dd34ce7bc7d1dfea555336fcfe355f5a57d14b6895f975fbf05194177c156889628b134ee70a3181788fe315b299952470bac8a70d651d1a4bcb99b082062c6d
-
SSDEEP
3072:bEHuVcqMIrEM/3ruhHpPKeqv1l/fnv+8UMBZJrX5RFcCM:bEHQcqMIb3ihHIeqtl/HHZvRFcD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1812 WMIC.exe -
Loads dropped DLL 1 IoCs
pid Process 1928 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1928 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe 1812 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1812 1928 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe 30 PID 1928 wrote to memory of 1812 1928 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe 30 PID 1928 wrote to memory of 1812 1928 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe 30 PID 1928 wrote to memory of 1812 1928 4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe"C:\Users\Admin\AppData\Local\Temp\4fcdb7912b6335b45abacf4b4eaf78ef4474753534035f1c45c0017bea4d62d5N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Intel\WMIC.exeC:\Intel\WMIC.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ed716e7d91d72cde335ea1903c72fa57
SHA17584e9bbb97073f26f6087474ccaf2e9bad75671
SHA2565b500c27bbfe2a2d6fb63930e7ea2a77483036b1ec46222f855b445d628f2547
SHA5128a403cc9dcf00ad951602aae9a3cfff37f5cbd4f84baf607177f2bd7321ac58b90b969472fb4b44ee0585db05b0ddd1b6628a2b0990e73c6de2fc3d24e9945cb
-
Filesize
204KB
MD5ae0480df853877544c6fa86a87b70038
SHA1f94f9da37c05d14bc3ffefb71cc4b2acf6e20685
SHA256f7e5fc4bf0261358561787f936fbadf3396b3ff4eec3bd0a4a58a7c7d3610cbb
SHA51248fa03eca353e0038fd8278adab34d9c087862f52c4cc6d00ef582092c2d42771ec4e59f2c9607dc1e7590f9b1f46514df8e446f279916b8d2aa7ca9902372a8