Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe
Resource
win10v2004-20241007-en
General
-
Target
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe
-
Size
539KB
-
MD5
68662e186e277f0efb92a2951467e930
-
SHA1
c29bd6a07649732f443920626454ab85b947efc1
-
SHA256
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88
-
SHA512
6b0a7b467de3553d1aba23feba977570742fd2b0320ef4ec10e81bc8072be22a14513a1339d14e0059b8523b086ccab7cac1ef135703de47ddc04cf3da18f23d
-
SSDEEP
12288:Ld8dsHxFBLIX+NSKcNyBc18bCCwO+TalLF:LdfxjIX+svMcimCwO+TalLF
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
9ECF.tmppid process 2524 9ECF.tmp -
Executes dropped EXE 1 IoCs
Processes:
9ECF.tmppid process 2524 9ECF.tmp -
Loads dropped DLL 1 IoCs
Processes:
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exepid process 2528 f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe9ECF.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ECF.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exedescription pid process target process PID 2528 wrote to memory of 2524 2528 f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe 9ECF.tmp PID 2528 wrote to memory of 2524 2528 f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe 9ECF.tmp PID 2528 wrote to memory of 2524 2528 f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe 9ECF.tmp PID 2528 wrote to memory of 2524 2528 f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe 9ECF.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe"C:\Users\Admin\AppData\Local\Temp\f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\9ECF.tmp"C:\Users\Admin\AppData\Local\Temp\9ECF.tmp" --pingC:\Users\Admin\AppData\Local\Temp\f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe 811FF0E9A3C05371D0C180E160857E7261046CC50281474D382C37FC41B294C9BA64CB276C91950981C11972F4B0BF70F18EB38CC95CBAF85DB4401EB8E22A672⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD58e5b72fe258684f3ab286b9ae19fd47d
SHA1cb8f08863f4516838e7f6f63c4aa4e48057c4330
SHA256f51ac8f3cef1eac25ca4864563b928e87f14fcc7b8f8294bb4f626d7b722a455
SHA512d4d13356ced516bcebc6938b62675b404e36d6a33af05e1032d8754cdbbbc3d6f204329da29c026f5d19f275c4f7dade61d2bce24fb11645b5bf67a6c84fc20c