Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe
Resource
win10v2004-20241007-en
General
-
Target
c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe
-
Size
324KB
-
MD5
5e49c994074a894bf6a3fd7bc23dc52d
-
SHA1
db9255da328a96d8f34d9f72ec61a8e30b7cfe8a
-
SHA256
c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2
-
SHA512
56355107d8da898fe85c41c9029a5f1604b0ad07ba585b13c908f7169d6b4c2a6ed1fb80fd8bcc523644a23421f2ff3acb2435eb4554cde40a4197f60aadadc3
-
SSDEEP
6144:ZMndqhZ9qEqAEoMsF+P9lzb5v2RabRsoMsF+P9lzb5h:Gd89qeZMsF+P9nTMsF+P9nh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2544 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe -
Loads dropped DLL 1 IoCs
pid Process 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe 2544 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 264 wrote to memory of 2544 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe 32 PID 264 wrote to memory of 2544 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe 32 PID 264 wrote to memory of 2544 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe 32 PID 264 wrote to memory of 2544 264 c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe"C:\Users\Admin\AppData\Local\Temp\c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exeC:\Users\Admin\AppData\Local\Temp\c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\c7771713db00eceb482af2dd976357673739e59bc0ab2a91aa7db572ed9884c2.exe
Filesize324KB
MD5003e2bb625512e1cca327fa77f5b138c
SHA18ff0bfacd49e5308121f41841336e3c314d7ade7
SHA25670bb895e1b39b139d3b2dfe9d724a40c8c21dc44b5fd9d4deffa6d3fb6f3ccf6
SHA51277eb39a4ea33dcc4ce181e1b48f99b805db9276613a76402b245957b60023bc88f88b0b974b992efbcd0fbab253d6af4a44ee5b1d2e698ab55dda0a8de738697