Analysis
-
max time kernel
74s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe
Resource
win10v2004-20241007-en
General
-
Target
a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe
-
Size
702KB
-
MD5
e4c7959ff1273226eaf8b8b0ee3f5491
-
SHA1
37e02d65dbd46fe77328a668aa564b376398609d
-
SHA256
a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4
-
SHA512
35b0f3c0f139be121b43f677c4d0f65073097ea8dbafd7b83cdc3d4950e51386c8e2dff996d7ab2b0e3c0482df47db17ddc701b86d2b80c870050c83d3986475
-
SSDEEP
12288:AnbcDwHNh8GFOqYujtjlNWnM80/dHZhQj07Qk8wAE4KJLZmX1o:AnDHP8GFOqttv40/d5hQA7jAEFLZmX1o
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 900F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2860 900F.tmp -
Loads dropped DLL 1 IoCs
pid Process 3012 a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 900F.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2860 3012 a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe 30 PID 3012 wrote to memory of 2860 3012 a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe 30 PID 3012 wrote to memory of 2860 3012 a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe 30 PID 3012 wrote to memory of 2860 3012 a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe"C:\Users\Admin\AppData\Local\Temp\a4e9172d8bb30fa6cdf18cbceb6bcd40b885d94b33b00893c16f1886608f58b4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\900F.tmp"C:\Users\Admin\AppData\Local\Temp\900F.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD5add801aba3180768538a9c9c2be0e419
SHA14489835b6a3bea3645f2d901ee55934e639c4e4c
SHA2562dae2e64593a7c50ab5f4aba7ce2a93c11b7fb4eacc2fae2034f96a2ea2f4a68
SHA512c1e547ebfe8b73da2487d54a8181f719af003d021b8f4195b39276f7ff0755efdc4019dc06c5df7e1af5ffce1b15e16362d409f9ec0dd094a69d5b5b5e416903