Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe
Resource
win10v2004-20241007-en
General
-
Target
ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe
-
Size
476KB
-
MD5
206db3b72c664a5d2b134fb05f87b440
-
SHA1
1f3932ae5cc8f05900999be232492578ee3c0ab1
-
SHA256
ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9
-
SHA512
62e19ac0058fc647e7d3f92624b2ada9052143a7801d1a697d2e638590fcdb6e94676e26ef227e1aaac477054243e89ea3c9ea95eb6ed214d610b5592c5f6414
-
SSDEEP
6144:QyJZv5zFiIO5K9vxsJr6x7oEooLuV9u3SKk9e2dkIZFF2AU:QcLFQ6KEHi9I
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28 PID 1684 wrote to memory of 2424 1684 ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe"C:\Users\Admin\AppData\Local\Temp\ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe"C:\Users\Admin\AppData\Local\Temp\ae9fd4734ec7274ed25d4cdb8b6ab2c8f5c919c213f9cca30fd2c1934489e3e9N.exe"2⤵PID:2424
-