Analysis
-
max time kernel
116s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe
Resource
win10v2004-20241007-en
General
-
Target
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe
-
Size
1.1MB
-
MD5
fdbaef78bebf2082aa4918d06a3bab10
-
SHA1
0796969001f4ade47d2786046ee2401a582e3797
-
SHA256
d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346de
-
SHA512
f59228479befa8b23771ab9fb522a5e2d3ba0a5f9ee4c1621a9d5720a5ab41b1c4b88db47093646cbf572e214e8e742bd1bf2997259ff9ae32024747d11be743
-
SSDEEP
24576:JQ1OIyYqCfVk4Ym/jTnGDcZELIveNNvVohH2LUpDW9Tgn:JQ1Q6y4YmrVeNWrDW9En
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe -
Suspicious behavior: MapViewOfSection 11 IoCs
pid Process 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1092 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 19 PID 2132 wrote to memory of 1160 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 20 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21 PID 2132 wrote to memory of 1196 2132 d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe 21
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe"C:\Users\Admin\AppData\Local\Temp\d62dda6f7c67df34a12d2a79b4b6768246abeaada5b8f5f5bb32be7b438346deN.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2132
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2572