Analysis
-
max time kernel
107s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe
Resource
win10v2004-20241007-en
General
-
Target
413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe
-
Size
162KB
-
MD5
c1841ca15a963bb66f5fd51c9afe0d60
-
SHA1
03769aba2ea6433fdbb2d511c1856d6844d3f867
-
SHA256
413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117e
-
SHA512
5a31f81a3f60f91d2e2497aa4a4234b789fa198fd08da989927894ac41f62b43ea79117b213d2d989958e0b4bc3d71f46f53170398c2b344b03845a5fa0c053d
-
SSDEEP
3072:izqo24uzJB3oSK9se8G1jDiw0O4IPTW7BYJgU2xxRa4+OsIW9Qtyj:iOoXuC9X8yjDiwV4BFYmUSxRSIWSw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 704 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe -
Executes dropped EXE 1 IoCs
pid Process 704 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1372 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1372 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe 704 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1372 wrote to memory of 704 1372 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe 85 PID 1372 wrote to memory of 704 1372 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe 85 PID 1372 wrote to memory of 704 1372 413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe"C:\Users\Admin\AppData\Local\Temp\413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exeC:\Users\Admin\AppData\Local\Temp\413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\413503f3e554249343a133bf09486a5af8e4a4b5721e18bef5de870579c6117eN.exe
Filesize162KB
MD56025b3f6e9a004f802828a0133382fbb
SHA15663a25f70de9efda2e80e4ccebd033326719c38
SHA256e60595435776a3845e09bbe26bc913aa7de35a79891836b627eebb4d8423960d
SHA512a4e2600759bc43af442eaa41c2cfb1168148b28b609401e8460ecb4a7f7e1832d0b513163ca194ce9d670bdc457272eb68952fb16f0baf3fb4e746022d15d47f