Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe
Resource
win10v2004-20241007-en
General
-
Target
c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe
-
Size
237KB
-
MD5
f71008cff59cc34b8641ce522e450a9a
-
SHA1
f003412141c3e046bc88b765298a62bd0386d737
-
SHA256
c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d
-
SHA512
1bb5fca9e013307caf4e786e3c10f77886053c8ed217dbfdcee878537fa8c97bc153e1c8842eb72aa884efc6bf905fc7e7fecd48f0881cffbfb5c550e43b7af4
-
SSDEEP
3072:TgX5nIbwHRDpAbhnjsoT4CCauAzl601HL/h4JyEsIkDPrIJ08Y4gbjGOVcmUYdta:KmS7AVsocH0dWs4kDThKseNLDw
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2300 tyh3z92hmcmgbqdxtuu.exe 1528 laenlivuoj.exe 5100 qfggfjgd.exe 408 laenlivuoj.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\lebmevpuwcydfzr\xxmr5xjcverm tyh3z92hmcmgbqdxtuu.exe File created C:\Windows\lebmevpuwcydfzr\xxmr5xjcverm laenlivuoj.exe File created C:\Windows\lebmevpuwcydfzr\xxmr5xjcverm qfggfjgd.exe File created C:\Windows\lebmevpuwcydfzr\xxmr5xjcverm laenlivuoj.exe File created C:\Windows\lebmevpuwcydfzr\xxmr5xjcverm c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyh3z92hmcmgbqdxtuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laenlivuoj.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 laenlivuoj.exe 1528 laenlivuoj.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 1528 laenlivuoj.exe 1528 laenlivuoj.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 1528 laenlivuoj.exe 1528 laenlivuoj.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 1528 laenlivuoj.exe 1528 laenlivuoj.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe 5100 qfggfjgd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2300 3052 c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe 85 PID 3052 wrote to memory of 2300 3052 c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe 85 PID 3052 wrote to memory of 2300 3052 c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe 85 PID 1528 wrote to memory of 5100 1528 laenlivuoj.exe 88 PID 1528 wrote to memory of 5100 1528 laenlivuoj.exe 88 PID 1528 wrote to memory of 5100 1528 laenlivuoj.exe 88 PID 2300 wrote to memory of 408 2300 tyh3z92hmcmgbqdxtuu.exe 89 PID 2300 wrote to memory of 408 2300 tyh3z92hmcmgbqdxtuu.exe 89 PID 2300 wrote to memory of 408 2300 tyh3z92hmcmgbqdxtuu.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe"C:\Users\Admin\AppData\Local\Temp\c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\lebmevpuwcydfzr\tyh3z92hmcmgbqdxtuu.exe"C:\lebmevpuwcydfzr\tyh3z92hmcmgbqdxtuu.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\lebmevpuwcydfzr\laenlivuoj.exe"C:\lebmevpuwcydfzr\laenlivuoj.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:408
-
-
-
C:\lebmevpuwcydfzr\laenlivuoj.exeC:\lebmevpuwcydfzr\laenlivuoj.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\lebmevpuwcydfzr\qfggfjgd.execlnbcrmpzcee "c:\lebmevpuwcydfzr\laenlivuoj.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5f71008cff59cc34b8641ce522e450a9a
SHA1f003412141c3e046bc88b765298a62bd0386d737
SHA256c164d8959adaa00c86eca49d602f25670058a5a85d8a740e1b7ea6b1862dca2d
SHA5121bb5fca9e013307caf4e786e3c10f77886053c8ed217dbfdcee878537fa8c97bc153e1c8842eb72aa884efc6bf905fc7e7fecd48f0881cffbfb5c550e43b7af4
-
Filesize
8B
MD5f7e1f810561ff09ea650130b4f8135bd
SHA15defe220e382632b1ad14ae6fccf9466d60cf184
SHA2569ed33f2c4fbe8d778642ea94b817de57519f6c6015665c31bd2d69367b48c002
SHA512be2f0c07463caaaa7dd3fe164bad1d49646d051a75ab60e708a10443b41e34fabdecb8bff0c43bceaecebeb692e78b150086aecc5b6ce041e0d919eea9a8d8fd