Analysis
-
max time kernel
77s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe
Resource
win10v2004-20240802-en
General
-
Target
9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe
-
Size
59KB
-
MD5
fcac04061dbe800a2766ef5c32c0f600
-
SHA1
bd4250b259bd1ad2b42f6c42833cc6d1b7c54cf8
-
SHA256
9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8ae
-
SHA512
22c823f2a2d7de712af872f80b6c9353533f5527f167ccb8c8a3e3e48fd34f3b941954717d061c49b3bd61b4021f2c5f68fd0948e84b3f08c878bd17b1beb4f2
-
SSDEEP
768:ac/otJ+aRlJoxUDqRH1/PZE0ZhBBLSLHg0TXasqzViWy+RfxNcht97:acsbRHonlDhBBLMHlzSByONut97
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31 PID 2460 wrote to memory of 2652 2460 9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe"C:\Users\Admin\AppData\Local\Temp\9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exeC:\Users\Admin\AppData\Local\Temp\9f44eac5316a7fe9cbc631e0df45f2a69e86ff0e2bd32fdf2d22fc924238d8aeN.exe2⤵PID:2652
-