Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:56
Behavioral task
behavioral1
Sample
0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe
Resource
win7-20240708-en
General
-
Target
0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe
-
Size
80KB
-
MD5
9e42e5c34a8463b198dc466f8b1173a0
-
SHA1
45b0787120f6db6a51443e0d06234f6bf12962d1
-
SHA256
0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2
-
SHA512
35b46e555e40763608e19c083ef15e7979ddd54279baaffbe912529b32a6df34c502c60a007a831003ec273266b24c9cd1553aacdbed18316b81ec1897b498f5
-
SSDEEP
1536:gzpKNJfkzdOJ2E/PBV5p56QZtjPOiFONAa0CmuJd4BXL:IpKNpZ2mBN0QZdDFOqaBbd45
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe -
resource yara_rule behavioral1/memory/2024-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x000700000001211b-10.dat upx behavioral1/memory/2024-12-0x0000000000160000-0x000000000019A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe 3000 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3000 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe 31 PID 2024 wrote to memory of 3000 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe 31 PID 2024 wrote to memory of 3000 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe 31 PID 2024 wrote to memory of 3000 2024 0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe"C:\Users\Admin\AppData\Local\Temp\0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exeC:\Users\Admin\AppData\Local\Temp\0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\0e274df4d3711e5dcd12ae9b57b70a69bd8de7397f7221c88e2d074a4c5341d2N.exe
Filesize80KB
MD576eb3f71e24deb04d3e7f999c6af5161
SHA12d0642fba9e19b17ca240e93a3a44d51455808d2
SHA2565cc4000042cf1d4cd6cc2a94b48409aa1d75893ac36d5f36cec9689ed2c2ff72
SHA51211bff9d1ab01aeb4bc38b618583f66234746e5c6bda00dc7f680054b67722063f8d2d1a9eac73142c11ac40bb3641f44a90ee09899569bd1faf1227622bb8267