Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe
Resource
win10v2004-20240802-en
General
-
Target
089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe
-
Size
6.0MB
-
MD5
e008b6098e06a8649a4b8571ffa49220
-
SHA1
062a79648e77e6c9df6106ae7d76a3d5b7c75a6d
-
SHA256
089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191
-
SHA512
1619e44a66ed7d6be300d83cdc222130cd15334df0c486269ce4c3e333a8777869cbfb5ac6c38fe3291ca9f312e9a7f21bca517da780d39a7f394f1fd2583ee3
-
SSDEEP
98304:emhd1UryefieQTqELFNMV7wQqZUha5jtSyZIUS:el/30qEE2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 4FF4.tmp -
Executes dropped EXE 1 IoCs
pid Process 2188 4FF4.tmp -
Loads dropped DLL 2 IoCs
pid Process 1868 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 1868 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2188 1868 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 30 PID 1868 wrote to memory of 2188 1868 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 30 PID 1868 wrote to memory of 2188 1868 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 30 PID 1868 wrote to memory of 2188 1868 089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe"C:\Users\Admin\AppData\Local\Temp\089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\4FF4.tmp"C:\Users\Admin\AppData\Local\Temp\4FF4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 550C08E8076E6B1863BB9671734DD5B55A58F5F4966B17F8949366A93980AD1701D03146B9980480F66B6DBA08FE81326EE87B39AD628E9394948C22F596014C2⤵
- Deletes itself
- Executes dropped EXE
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD52f99764c7d035931a1bc40c741f53f09
SHA1dbe290c689b4a1d67f1e37cb78bf60784a0ce4ea
SHA256f9c65079f8ef22a06eb7df56f0f8aec2026239c0494106c33a0da3c3d3194623
SHA512a8618dcf4f2a20ebdff3bd94b186ea7011b6bbc0b91c540bd362a8c3b57275f6d59e3822a27e276a3a240e9619ee18ee966ec7202b3fdd841a654fa13d14fdf0