Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 02:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
new11.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
new11.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
new11.exe
-
Size
1.7MB
-
MD5
8bfd0832ff17ddc754cbb8255bf082a1
-
SHA1
b122591eb866c46a99ef23d68695d2697c58eddf
-
SHA256
f91113268cdda2851f388315569c8760db82c2c688239779e194dd9429a2eaf7
-
SHA512
ff77abe57e1f40b78c93c12724b47a49d185f52b000efd218f2b4ae4dcc44af2c6d9ef524046856b4511836346689d75a1661b34f8879834c6bdc7ad51fd0086
-
SSDEEP
6144:yVA2NmmNmNqlu161Wb4Q+iViAkKL9X039hD:jr+WbR+IiAkKL9E3
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3580 set thread context of 4952 3580 new11.exe 82 PID 3580 set thread context of 0 3580 new11.exe PID 4952 set thread context of 4636 4952 new11.exe 83 PID 4952 set thread context of 0 4952 new11.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new11.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4636 new11.exe 4636 new11.exe 4636 new11.exe 4636 new11.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3580 new11.exe 4952 new11.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 4952 3580 new11.exe 82 PID 3580 wrote to memory of 0 3580 new11.exe PID 3580 wrote to memory of 0 3580 new11.exe PID 3580 wrote to memory of 0 3580 new11.exe PID 3580 wrote to memory of 0 3580 new11.exe PID 3580 wrote to memory of 0 3580 new11.exe PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 4636 4952 new11.exe 83 PID 4952 wrote to memory of 0 4952 new11.exe PID 4952 wrote to memory of 0 4952 new11.exe PID 4952 wrote to memory of 0 4952 new11.exe PID 4952 wrote to memory of 0 4952 new11.exe PID 4636 wrote to memory of 3496 4636 new11.exe 56 PID 4636 wrote to memory of 3496 4636 new11.exe 56 PID 4636 wrote to memory of 3496 4636 new11.exe 56 PID 4636 wrote to memory of 3496 4636 new11.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\new11.exe"C:\Users\Admin\AppData\Local\Temp\new11.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\new11.exe"C:\Users\Admin\AppData\Local\Temp\new11.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\new11.exe"C:\Users\Admin\AppData\Local\Temp\new11.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636
-
-
-