Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe
Resource
win10v2004-20241007-en
General
-
Target
2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe
-
Size
15.0MB
-
MD5
c97c1701196b0fec08feb6caebe7b0e2
-
SHA1
7a06dd3cb34e7493c376af13c4553a078251b114
-
SHA256
2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40
-
SHA512
ddb0ad72c594478e0eff754dff9aff2e71e356d271378fe70b6710e88ed879a15e4410660d87c3f4f186f10fab80c64f39af5164300ae236f783a0d9e05d0af0
-
SSDEEP
393216:dThABRWI8jKEz4paPQxq9OCrGYDh19L1FPkTJtZO:dTWBgIuMgQ+OCZDH+TJtc
Malware Config
Signatures
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2608 wrote to memory of 868 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 86 PID 2608 wrote to memory of 868 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 86 PID 2608 wrote to memory of 868 2608 2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe"C:\Users\Admin\AppData\Local\Temp\2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵
- System Location Discovery: System Language Discovery
PID:868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2752180e7251178930189a0ca210c94376e88f6f322b2920a480a99a0b4b2e40.exepack.tmp
Filesize2KB
MD516185d03f8913f9818d3d0c87a1445f2
SHA1905c444f8fa9ba108427522977c61d146bbb480a
SHA2565a11ab1dd23410c0bcbf40573121e031a5ba91ad6a1eca1e78f4a64f720f0338
SHA512d685aa57aef65e650b971c37e09b4febfe350b6e496fe811aa463e19890801b2b8612d88a86a9d308a620eb9c8d7f7cc6cc66db47e61e3e3332489d1cab714e8
-
Filesize
549B
MD561615d83e373a87c8e1f24a34303fc31
SHA1b3b6636ba98662a146687ca9eefa8ae28243bd22
SHA256bf9b8b6f57f0cb774ada54c0cbddffbce640013220dd978d73b3e362a56eaa82
SHA512a8e112207b8b9c826e8047b71cacb2e7c2853028e67548120c4311d0f866a9915bdca7b85b761506b4b9c557d5c885e1574dc3412101a50f31979662acf77985
-
Filesize
1KB
MD5f2c7ba3b970a3011fd8e305329937041
SHA1f6eed40624e091c94f1a1244032597ea2927c381
SHA25639b1eb4ab8864190095037d7888e5d016ce8473737877059a332c51afb976697
SHA5124c21a02b4008536733c4b195c57fbeb2ca3be06ad022bd8e123f36ae90e1e322b0e637242ada34c7f6019a45822bd1198437ee90667cde06bc821d3923b00428