Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 12:41
Behavioral task
behavioral1
Sample
ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe
Resource
win10v2004-20241007-en
General
-
Target
ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe
-
Size
72KB
-
MD5
a8f6d6d5fd9d3d0661b3458d282a5810
-
SHA1
4baf8b338b1922d99a226f4013f8d6110188079b
-
SHA256
ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2
-
SHA512
670233b55607de3a6be96efa265eb9928f1862d36a0f9246592f3c4f4554286d740ce14fa4e607cf232d42b0dd90a14fe3e7cb3bf7298e98b6c73b6023b8da56
-
SSDEEP
1536:ILTYdVOXo75KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u474i+Ge0Nc8QsC9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2928 2504 ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe 30 PID 2504 wrote to memory of 2928 2504 ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe 30 PID 2504 wrote to memory of 2928 2504 ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe 30 PID 2504 wrote to memory of 2928 2504 ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe"C:\Users\Admin\AppData\Local\Temp\ad3120484756dc0f5f7d04adeb077aaadac88266e2b3567e3b4b17586fc90ad2N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{1fa16091baf5c237b270c57d0757bed9}'2⤵
- System Location Discovery: System Language Discovery
PID:2928
-