Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
Fnloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fnloader.exe
Resource
win10v2004-20241007-en
General
-
Target
Fnloader.exe
-
Size
24.1MB
-
MD5
e091e9e5ede4161b45b880ccd6e140b0
-
SHA1
1a18b960482c2a242df0e891de9e3a125e439122
-
SHA256
cee28f29f904524b7f645bcec3dfdfe38f8269b001144cd909f5d9232890d33b
-
SHA512
fa8627055bbeb641f634b56059e7b5173e7c64faaa663e050c20d01d708a64877e71cd0b974282c70cb448e877313b1cf0519cf6128c733129b045f2b961a09b
-
SSDEEP
786432:4IpXDWoLTNOqMV275eEhoVu/nnO5Ka9NhW:5pXDhLTNJMQ75efVuvn2Ka9N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2128 Fnloader.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 Fnloader.exe 2128 Fnloader.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fnloader.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31 PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31 PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31 PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31 PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31 PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31 PID 2016 wrote to memory of 2128 2016 Fnloader.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fnloader.exe"C:\Users\Admin\AppData\Local\Temp\Fnloader.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\Temp\{9EB7F1A0-9A1E-4FB0-B9CF-655D74F68572}\.cr\Fnloader.exe"C:\Windows\Temp\{9EB7F1A0-9A1E-4FB0-B9CF-655D74F68572}\.cr\Fnloader.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Fnloader.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1882⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
634KB
MD5cb264f7d256b42a54b2129b7a02c1ce3
SHA1d71459e24185f70b0c8647758663b1116a898412
SHA256d6aaee30c9b7edeac6939f78f4a55683c6358d9cc03dac487880d01f18700e83
SHA5124f623f5d21bc216f3dd040e6d0c663a8ea37efe5d0ce5f4aeb1ef5c1f7c873e19d1abc979d3e40d4dc70e2e4f0fc9a1b114b17d9eb852ea9a41d0f84356cd7cb
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2