Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe
Resource
win10v2004-20241007-en
General
-
Target
94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe
-
Size
37KB
-
MD5
1e409dbe5f2b2c0e5e319fd2c84c1f40
-
SHA1
ab82fa549642e61d49d56e8f8580b72e3592f538
-
SHA256
94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13
-
SHA512
be11da106c423153f3498e2ea62154a9e7e9e280b0485dad6f1d64fb0bd58c5d830be3705012d9a94090a20ebcf39c4ba4f0c9f58c0c9e551344270eada1e80a
-
SSDEEP
768:0MkJHSeGnELJP4chOkKivgO2C5pn8YiXMt/skFjzrW:0MuHS/u1hOk5oG5pn8Yi8t/sL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3064 serizay.exe -
Loads dropped DLL 1 IoCs
pid Process 3008 94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language serizay.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3064 3008 94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe 30 PID 3008 wrote to memory of 3064 3008 94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe 30 PID 3008 wrote to memory of 3064 3008 94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe 30 PID 3008 wrote to memory of 3064 3008 94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe"C:\Users\Admin\AppData\Local\Temp\94f8ad39a326a98f353fe3d4018c6991f2726b31e9984d94ad311fe9d8738f13N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\serizay.exeC:\Users\Admin\AppData\Local\Temp\serizay.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD55fbaa9510b557d64013f112589903df2
SHA1d8defe220060da7a04bb7d54a534fd0bb44d5075
SHA25606c8afceb3032b41a921441d3f228d3f724901b97b63fee210aa0a6d1c3d0d85
SHA5124adcd1526918f0284a2264755b67ea5562f4af352297baa395d274dc9c36156124e57d97878a76c2dc9e01a6b089cc6aff4814813a05a0c85321baf0a56fdede