Analysis
-
max time kernel
5s -
max time network
6s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-10-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
compiler.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
lua51.dll
Resource
win11-20240802-en
General
-
Target
Launcher.bat
-
Size
4KB
-
MD5
00aa88a3830ec93763303d15a1aaf745
-
SHA1
82d53af33aca86996ca85a2f8fb412bb5c19f9e6
-
SHA256
68dab9c38f8b3dcae2b4d327bbb4e4aa3ce4375efa9f7e92073d868334ee1daa
-
SHA512
31f329f54b3b5b2f9bbd0955f0dabcb2d7a50ebd9935af89e036455a063bf0d68305aee03ef51687ff6389e065fab477ac18edb60d19aec7692be29381b796da
-
SSDEEP
3:LjdIV9ZbLRJFFDa+ZFBW6:FIRFFV
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1948 5048 cmd.exe 78 PID 5048 wrote to memory of 1948 5048 cmd.exe 78 PID 5048 wrote to memory of 1948 5048 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- System Location Discovery: System Language Discovery
PID:1948
-