Analysis
-
max time kernel
11s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe
Resource
win10v2004-20241007-en
General
-
Target
6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe
-
Size
34KB
-
MD5
2d24a0ce3f06e6957893e87ea749dfd0
-
SHA1
bd7fa167ac4afee919b8a210b30818032ed5f14e
-
SHA256
6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bd
-
SHA512
874425d2c367234c873bba10eb5145196eee077b7831f0e4bf2ad5e401c7a117a5d855190b6890db1ee96865b96ab0748b520697316be38367e069e0cddc9dc1
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcsgYKv:b/yC4GyNM01GuQMNXw2PSjSKkcJYKv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language retln.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3012 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe 2404 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2404 3012 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe 30 PID 3012 wrote to memory of 2404 3012 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe 30 PID 3012 wrote to memory of 2404 3012 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe 30 PID 3012 wrote to memory of 2404 3012 6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe"C:\Users\Admin\AppData\Local\Temp\6368816ffaee01d9f3f15f2bd983aba96bd38d5041e9d678a894b2017d2ce4bdN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5ef2d2f7a7c2be42684194b046bcef0ac
SHA15627bacfc4a8ae6c9fc041f9297483e656ab4d54
SHA256b9235453520146d3de25e057996839b3617e33dc0ba017b49f467b4e15b206ba
SHA51294ad5c92467ad9053f75d8004a981a4ade185c303867fe004c379346f50a970cea36730dc63699d66db91b209be17d2c426b98be0fe718dd82f25b690b2e2b88