Analysis
-
max time kernel
10s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-10-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
0x0007000000023433-50.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
0x0007000000023433-50.exe
Resource
win11-20241007-en
General
-
Target
0x0007000000023433-50.exe
-
Size
705KB
-
MD5
a3789c9b2a0bde3b59c7612879f8c9d4
-
SHA1
a938c3009fcccaedd361ac52c6f53667c60fc82f
-
SHA256
f338e5a346c8a6b3234270fc6e31e9232a37f80e18df9702f7dcf06dffeb969a
-
SHA512
65255c566dcb5b441c1cd9e7a42400b3158bbc7ae8bfadcc76ecc0a75d6d75ac2be3fc03985afd9b7c9b08c2993564d9b4f52fd6896eeb8fa157be57822e4718
-
SSDEEP
12288:WwHy90MAQMK4zypwqHsGIziL6v5H09sA7pjvSdXlyNBvMxX/Wmvc9nRh0rp:WwHyf0ypBzt2OeAxsXENBkx/WWc9nRh2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4516 Install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0x0007000000023433-50.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4516 4076 0x0007000000023433-50.exe 79 PID 4076 wrote to memory of 4516 4076 0x0007000000023433-50.exe 79 PID 4076 wrote to memory of 4516 4076 0x0007000000023433-50.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0007000000023433-50.exe"C:\Users\Admin\AppData\Local\Temp\0x0007000000023433-50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD534f8ed66eca16cc312795ffbd9b5d8f3
SHA1e83bfe61b9251e58016137baf6d3bdee5fd8a37e
SHA2565480d9d8193700dfa31817e4755e3d2615b1c07f38421b19575051f03ba504c5
SHA51232003a0cf752c1bd0066f45858f3d765da3c0a0076639f6aaeb3dc0f0bb1e122a78979ca2c4d0e0fea2b7fc93078ad0c50cf2e1aa8651d59c3f122015142350e