Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe
Resource
win10v2004-20241007-en
General
-
Target
c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe
-
Size
84KB
-
MD5
0ee135ba3dc89b2ee598242c76be7981
-
SHA1
2d0caca91821dddb4f738a598077a0fc36ce3842
-
SHA256
c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f
-
SHA512
b4f471259b7dd49b26b7043acae2e23f787f12a9b589975201c8f81f8df0efdf69b68d936b417787bb15816cc5b1231d15a387e9c5024ef8dcbae0fadc642751
-
SSDEEP
1536:dXg0Lj9FsRApuOIakLzXS2ACcTCj2B80phhcyCWORRzUT4KzH12/Ap3Trq2+DOXZ:dQ0NuOBkLoCI02hK7tRRXKR2an/+Op
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe 2940 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2940 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe 31 PID 2160 wrote to memory of 2940 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe 31 PID 2160 wrote to memory of 2940 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe 31 PID 2160 wrote to memory of 2940 2160 c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe"C:\Users\Admin\AppData\Local\Temp\c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exeC:\Users\Admin\AppData\Local\Temp\c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c550e2aa0bd94409f4ee51ea0a51ce8a287292d90ae8bd891e3b15452338979f.exe
Filesize84KB
MD5d79f134c003f2f22958ef91da71f0b49
SHA1ce77c247a8dc9c30207774c5528ffe5af6c3e4d1
SHA256032f4a4071691d0ae82f39f0173d60e642c58ddf69a9ca427fe9944869e10df3
SHA512e5a42000344935abfcbc7100b117e62219a5771335ed5ca6b09ad00d630ab21b4c5e1fbdeda9bc5077631a0372e1f74f90f277c82e1b54a2c08a95d8c7a5a2d3