Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
CP.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CP.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pcracker.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
pcracker.exe
Resource
win10v2004-20241007-en
General
-
Target
CP.exe
-
Size
144KB
-
MD5
6f89165e8e53a7de51c54170440342ec
-
SHA1
6612ad167a9c2ea0fb44c753d16c10cdef85784e
-
SHA256
232cdd08c71762498d0dae0be75eb783dc64be139b7ba399ac239f4de1310962
-
SHA512
a689b30ef9368d070064c4eadc3c87b296cd9147da780aec136e9a0ba6e77c97ad2652ab3d43caccce1262465b7b57e1ce28152e49e31c87d96e505c9ad200f3
-
SSDEEP
3072:xMvszDYP4BVhalTQ9jAvfr94n0VNbmCXzzClkfoOCSdsCnKiI:m0zDYsV6TcjsfqnENiCXvClkQXSWCnZI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2104 2988 CP.exe 31 PID 2988 wrote to memory of 2104 2988 CP.exe 31 PID 2988 wrote to memory of 2104 2988 CP.exe 31 PID 2988 wrote to memory of 2104 2988 CP.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\CP.exe"C:\Users\Admin\AppData\Local\Temp\CP.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:2104
-