Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
cedbe523e4601988a2cc7b4886621d45110cb0b0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cedbe523e4601988a2cc7b4886621d45110cb0b0.exe
Resource
win10v2004-20241007-en
General
-
Target
cedbe523e4601988a2cc7b4886621d45110cb0b0.exe
-
Size
90.6MB
-
MD5
62ec18c629478fe2343b7e1b70973382
-
SHA1
cedbe523e4601988a2cc7b4886621d45110cb0b0
-
SHA256
ab265c4aff84d0424bbe317659eb945118c5d33ee8946a84767a1b4a15023fbd
-
SHA512
a72f30e6d81423783a41293c2a8fe6b1ae8a3abcb519e3d08c6a80e312b4a7bd3c30698e617858ec5fb82744a9618a317745a96790d8a048605a290b05b57c19
-
SSDEEP
1572864:d6TYEmzI1b4UVMtxrVsXgfJjNEONVy1TStLI2Swrp2es7DR/uyDmD272sygEE9JK:xEm8ZutxZsXuCONs1TStWwrlPAqgEEfM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2572 set thread context of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedbe523e4601988a2cc7b4886621d45110cb0b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedbe523e4601988a2cc7b4886621d45110cb0b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2572 wrote to memory of 2872 2572 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 32 PID 2872 wrote to memory of 2548 2872 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 33 PID 2872 wrote to memory of 2548 2872 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 33 PID 2872 wrote to memory of 2548 2872 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 33 PID 2872 wrote to memory of 2548 2872 cedbe523e4601988a2cc7b4886621d45110cb0b0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"C:\Users\Admin\AppData\Local\Temp\cedbe523e4601988a2cc7b4886621d45110cb0b0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7523⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-