Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 20:12
Behavioral task
behavioral1
Sample
02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe
-
Size
5.6MB
-
MD5
53cc66292414d4d0b5a6c363eb1a8e00
-
SHA1
35aab85ae73adc71caf10e3fea721863d2c45730
-
SHA256
02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27
-
SHA512
fa00c289b7a0ed2fe90a2943bce2fdff272159e2abbdb38d0fcf42a31bded8b2c2041cdb8f2042628a99859a6a8b856ee91af38a06d0e08812e7a42682613b05
-
SSDEEP
98304:/iaX+SOGQG7qMlZ27RuTmOb2Udq/zimca0n5AmPFKA6TAY4qVbK9rVJTNDD3zJ7P:/RtNjqBgJdabn05nFKXkhDhBMDwiV+rV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/868-0-0x0000000000400000-0x0000000001739000-memory.dmp upx behavioral2/memory/868-20-0x0000000000400000-0x0000000001739000-memory.dmp upx behavioral2/memory/868-27-0x0000000000400000-0x0000000001739000-memory.dmp upx behavioral2/memory/868-28-0x0000000000400000-0x0000000001739000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 868 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe 868 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe 868 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe 868 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 868 wrote to memory of 5328 868 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe 85 PID 868 wrote to memory of 5328 868 02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe"C:\Users\Admin\AppData\Local\Temp\02da93bef5c59d1ba608c0e9f7f5b2be770520ef5fea1f858b2ba8ee6713dd27N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:5328
-