Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe
Resource
win10v2004-20240802-en
General
-
Target
649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe
-
Size
29.3MB
-
MD5
6d6a207d5513fa5ac6ead647f5d66a6a
-
SHA1
913e0d1aadbc1593b76f6442bb89070bc4a5e224
-
SHA256
649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9
-
SHA512
ba7afc2ed1989758fa6da17407d81cf81c93fe3d0c7f896c03c2ac793551a3d9c26915d9f93d658644b7429647bb0a913d0e438ce6c429700cd8e2d998d0eace
-
SSDEEP
786432:lEKDCFe7MJ0y1mLlV8zKFT8ZQ2eoq6QY09C1a:lEACM7MfsL0KFT12eSr09Ck
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3560 649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3560 4272 649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe 89 PID 4272 wrote to memory of 3560 4272 649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe 89 PID 4272 wrote to memory of 3560 4272 649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe"C:\Users\Admin\AppData\Local\Temp\649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\is-1UDCV.tmp\649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.tmp"C:\Users\Admin\AppData\Local\Temp\is-1UDCV.tmp\649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.tmp" /SL5="$902D0,29832184,735744,C:\Users\Admin\AppData\Local\Temp\649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-1UDCV.tmp\649ec4858e572e0145e35a9faa712708949b7bb1bce1594154cda580d80a0ca9.tmp
Filesize2.9MB
MD5259e3ee4646fc251c3513eef2683479f
SHA1be09457567f0562e8942a28bd90759f6dce6dcb5
SHA256bd9f32a9b7b9663a3afdd1dc0ccc3d6423783b360db341691fe2fe71c543ec53
SHA51256607419ef2e2f98a8daa6478dea4b49925f4a17ab649e450f34331490281e2fcf976f17813f1a80fa460ee258c02901528a43b508093098135c1fadb5902b24