Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe
Resource
win10v2004-20241007-en
General
-
Target
72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe
-
Size
1.3MB
-
MD5
43c2c42ea86851bf81c2997c982ded7e
-
SHA1
ec84f4dbb89d128cac01452b16a918378a840716
-
SHA256
72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5
-
SHA512
87e4493ea03876c86bd156b5a0bd4b20dcf1016acf675c696f8adc8245b28bd7d3849ae0d966a9e0b1bb9efefb444216ff9064cffad2e960f166d8a036ecbfda
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLkLOSOrY/x4UmA6vgg7MOkda1CRdqd:f3v+7/5QLkLOS/x4p5t7OakW
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 820 set thread context of 2644 820 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 820 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 820 wrote to memory of 2644 820 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe 87 PID 820 wrote to memory of 2644 820 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe 87 PID 820 wrote to memory of 2644 820 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe 87 PID 820 wrote to memory of 2644 820 72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe"C:\Users\Admin\AppData\Local\Temp\72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\72303fe60f49db63a08c4a3afca9bd68ad42edab6579731c2acb9671d777caa5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-