Resubmissions
18-10-2024 17:25
241018-vzl1la1cqq 1018-10-2024 16:26
241018-txhdyswgqh 1018-10-2024 16:25
241018-tw78zsydrp 318-10-2024 16:22
241018-tvh8gawfqa 3Analysis
-
max time kernel
72s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
18-10-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
6812964531.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6812964531.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
6812964531.exe
Resource
win10v2004-20241007-en
General
-
Target
6812964531.exe
-
Size
67KB
-
MD5
7de65122a13ab9d81368ee3dff3cc80a
-
SHA1
ecbb4db641431d4d672e4b88e8d309419fd32f04
-
SHA256
a73a05a4b6ec6ae1c1ba6d3d12b68cc52b899e2a6dbbaaa1f48f2c260a733123
-
SHA512
b156d77a665c3256ddfd016e46105b6e87db6a4c1ca77e9bb25b221c368f3cc53dddc7159602cfb926ef0cc9bacac57b6bd41e7e28998883c996727d58d29401
-
SSDEEP
1536:pr3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/EXyBej:h7PEg3qcv5PvB/EVj
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6812964531.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6812964531.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6812964531.exejavaw.exedescription pid Process procid_target PID 2584 wrote to memory of 4860 2584 6812964531.exe 71 PID 2584 wrote to memory of 4860 2584 6812964531.exe 71 PID 4860 wrote to memory of 1532 4860 javaw.exe 72 PID 4860 wrote to memory of 1532 4860 javaw.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\6812964531.exe"C:\Users\Admin\AppData\Local\Temp\6812964531.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:1532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c4c698f2b753ffdb863379188d1d852d
SHA1f6954bf076411e717daecb732b8a4c5eae11c37b
SHA256db733b87665fbbe844293420d548f266c7e5727c5c80d50e6f2409d0c60418a9
SHA5121e436c0082030e1f6f85aa799148839a30e65888c5068ff23491dbd004e6aa9daa180566f8ed316d6e04db1f54e68aa577e83d4a45a51e01e0a594bc02f242c1