Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe
Resource
win10v2004-20241007-en
General
-
Target
9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe
-
Size
4.2MB
-
MD5
7ec8dbd4b0284b09eb91783491cfcac2
-
SHA1
6466f8b448bb7ae0e0ba9e8c7feb2fc568c2cf77
-
SHA256
9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144
-
SHA512
ba691e6da8dbde6dd4ce9cb92e39c123d46759b2ccffad3e1e85616b342f20f124609b251823697a56f16638c6e89e4deb332ad0694409cbf1f7d53fbfd75a49
-
SSDEEP
98304:Cmhd1Urye6skF8BgFPfvBHxCVLUjH5oxFbx:Cl4OBGnvHCVUjZEd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 300 C707.tmp -
Executes dropped EXE 1 IoCs
pid Process 300 C707.tmp -
Loads dropped DLL 2 IoCs
pid Process 2484 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 2484 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 300 2484 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 30 PID 2484 wrote to memory of 300 2484 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 30 PID 2484 wrote to memory of 300 2484 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 30 PID 2484 wrote to memory of 300 2484 9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe"C:\Users\Admin\AppData\Local\Temp\9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\C707.tmp"C:\Users\Admin\AppData\Local\Temp\C707.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 6ADC34754A17BD5AF3A90C1D7642965D285355E92A29FC6F2EFD13604BCC7376E0BAE829308A198B7660E9366070DA1F6E289140CB25F19B5B2B9A72AE3BDA482⤵
- Deletes itself
- Executes dropped EXE
PID:300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5f8230ed3317482dedd37cf4838ff7762
SHA1ef5160f022098c6135a87b48baad0ffd10608007
SHA256799f582d19014d7d640903c2ed9b46151e19e8cf3f1e3816f4d6a4813cbd2135
SHA5124e37240343b3fb05ef656505fb14f5e8febad1c696ad4e8510ad6f490641fe978579133d698fabc652934ef0ba7422622a7b86e61744e67c7e1557b912aa8d99