Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe
Resource
win10v2004-20241007-en
General
-
Target
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe
-
Size
224KB
-
MD5
ab62135e37a25f5913e938799e9dad9d
-
SHA1
cee5ca01392ddb7de29c2688c624fcaaed34e1a3
-
SHA256
11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3
-
SHA512
881ac1546d101932997f80822c59dee9924d17ca148fede7373f2b89a96da9ecb09060a19eeebfe07ed5ad9af239ab58ee278122f0a3e35d5b3cc4192f1b1ea3
-
SSDEEP
3072:prf68sOI3V8arcCXM8fmvbpjLOIig7L+cD4CZs8s3Pan4:BlwVxbMtLu8VZcCn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3332 WMIC.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1436 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 1436 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 3332 WMIC.exe 3332 WMIC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1436 wrote to memory of 3332 1436 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 83 PID 1436 wrote to memory of 3332 1436 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 83 PID 1436 wrote to memory of 3332 1436 11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe"C:\Users\Admin\AppData\Local\Temp\11ff5cdad19dd895932a9d7b88b5f6c9fa27ae7ea39772fc7b7971bc86258fc3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Intel\WMIC.exeC:\Intel\WMIC.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD52cea62bbd5577dba8fd97258d2a6e002
SHA1be0eb93438cb32443548603cc1dd17924c754e68
SHA2561d0de5fbc3e362232ef227224139dd07a34eb2317d3fcda414e07f4defc7ea31
SHA5129cc052c0812c59deed8d2bd2beaf4a70a04cf367000ad48642ab62a36c42eb513c1b6b346cbabd8ad90bb183d3060919e0481658e398be84addc266430e971e4
-
Filesize
8KB
MD5ba5c02509445bb656f5c71b392c2525e
SHA1e75e978cc722cc0181f5440aaad0915ab205eece
SHA25654acd5643638b2daab2f95fb515b5ee72e0c60fe906a2fc61bc54fc8baad0e4d
SHA5125d7deacea3bb1cea2307f7ad48265f19a14d431614de3afe0753ea1b845b75460525260cf396fd4262fc3ed62dd562baf450063e157b3a3cf9e2496dfecd2362