Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe
-
Size
4.8MB
-
MD5
fbd8d2918e14f2ecfda43a8f263ca070
-
SHA1
202212ce1e1c17b8bac2724a2a318f93439a440b
-
SHA256
d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336
-
SHA512
c34f81a73fe8342a480e4c7cb17f040c90dc94a40442e62a6f28f058eb65ee10b47c0c1bcc8763d5750ffd2770d1a1d633fbebe46595d3e4005401da8a47c6f5
-
SSDEEP
98304:ZwREbNDjVQhJBTSLRxudubttUlhtnrbeD8bJdqUMsv3SF:75jVITSlOuf2htrb7ysqF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1864 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp -
Loads dropped DLL 1 IoCs
pid Process 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1864 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28 PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28 PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28 PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28 PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28 PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28 PID 1996 wrote to memory of 1864 1996 d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe"C:\Users\Admin\AppData\Local\Temp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\is-ECAMA.tmp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp"C:\Users\Admin\AppData\Local\Temp\is-ECAMA.tmp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp" /SL5="$40016,4117338,795648,C:\Users\Admin\AppData\Local\Temp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\is-ECAMA.tmp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp
Filesize3.1MB
MD59fb52fba6ccb2902b291c6d2d3a3d527
SHA110509d197f42ec69c7568953adb84c363468eba3
SHA2568fedb63cc0faed06579d175d6437b8a9d1ccffacde27fd619d40cbaebcc36444
SHA51205e61d9206cfbb38974492f9f322700a0d349cbfaa049dfc437cc681761ce69660af5aebac159ea5586577c1a5916d7592e43a21bc3918c18907fbc009b79b49