Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe
Resource
win10v2004-20241007-en
General
-
Target
e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe
-
Size
162KB
-
MD5
70760257102423b4d9e15a08738c07bc
-
SHA1
f693883a331dd3cd5c12a2682793936673a1ade0
-
SHA256
e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183
-
SHA512
871cbef149bce6a9e07384c314ed83f402ec1968b88c4d61c93ce3d3210f5985727340032a6546ca437628f11d0d8bb3749a172e88e583801683947140b70bc8
-
SSDEEP
3072:bT/spSSKam+qZFLCOKzf99AxYfYVXwuOYqlDmP24Jgn4ojJBffJH:bT/spSAmZxC5L/K/wuOYGm+CSTHJH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1528 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe -
Executes dropped EXE 1 IoCs
pid Process 1528 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1020 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1020 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe 1528 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1528 1020 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe 84 PID 1020 wrote to memory of 1528 1020 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe 84 PID 1020 wrote to memory of 1528 1020 e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe"C:\Users\Admin\AppData\Local\Temp\e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exeC:\Users\Admin\AppData\Local\Temp\e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e41375d57500c38ff51753a8472e336ac58064f0fedd896e095c0d116558e183.exe
Filesize162KB
MD504213d62e4610e1768639407560f14e5
SHA13995212a98acf9540f51bf944228ab632540e488
SHA256bb8a0957ee60bfb6662d93022c1754bc496a05879bddb129c698da074c3f413d
SHA5129e326c7f0937feed95a9349f3a92b6c2b630399ce26c051978e68a2511ddc8c8f3ccb217d296bb52e98ab300944e61103814ff9fb2ef4e677da37e97f46cf4d4