Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe
Resource
win10v2004-20240802-en
General
-
Target
55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe
-
Size
5.8MB
-
MD5
1ad95eb77ba3af998763ee9a088f44f8
-
SHA1
34fefdecc3eba4edfaeb7834cda89c25ada83a9f
-
SHA256
55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754
-
SHA512
5a08bbdf845a6397d86c5709c364ee454395971e30f75795b9bceb04a3c21367095a04fd570bfb229e631620f16124825c85c8daa8b0eb30a9f72f800cf94c03
-
SSDEEP
98304:pbaZBcfUkR+MuXPNvSyVlgKXuz0IMMyAacwyCGCmNM1xSlHZSGEH:p+ZBcMPFXVlWz8PcwnGCPPp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4092 TLFReader.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TLFReader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4092 1572 55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe 82 PID 1572 wrote to memory of 4092 1572 55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe 82 PID 1572 wrote to memory of 4092 1572 55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe"C:\Users\Admin\AppData\Local\Temp\55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\TLFReader.exeC:\Users\Admin\AppData\Local\Temp\TLFReader.exe 000000002⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD5b739b604eaaeaa4bedbdf86ce86a12de
SHA1787be519d559ef46f1e1ab3f0a36ffdcfb55411e
SHA256e36cc0d031e816412efc7e4ddec0e843ec3b3faaa31e88b95bdb07036960b102
SHA51251ca94aed3fe487c142ef8159afa7559f0339273396705064182881258dd8d2e4fe9eee8d36a154d62de83f23f1735fa83e197ee19c4fe9f3440fdbe7b9a40a0