Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe
Resource
win10v2004-20241007-en
General
-
Target
3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe
-
Size
1.2MB
-
MD5
dd888983c289f26094548b42ac5b6c85
-
SHA1
a1893cba8b45a0294340419f03e05140f0b62c3b
-
SHA256
3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d
-
SHA512
e84aeb3aa9749b6a7d9cfd1f753c02fc87fdf8754c46e7295c1391e62273ce57c135a09519499b88d76655597b4d66c378a5086c10bcf413ba6ce69f66b8e42c
-
SSDEEP
24576:9tb20pkaCqT5TBWgNQ7aQBXc9A9HHYLnPh2VQ7hxtf6A:uVg5tQ7aQm9BjZvF5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4016 set thread context of 2060 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe 2060 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4016 wrote to memory of 2060 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 82 PID 4016 wrote to memory of 2060 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 82 PID 4016 wrote to memory of 2060 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 82 PID 4016 wrote to memory of 2060 4016 3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe"C:\Users\Admin\AppData\Local\Temp\3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD56312be8e131d2b7342ebdd0c1e4fe151
SHA12607a0c691260292b0a5de028e22b183f22a2617
SHA256cd3e6b088ebb686fcffa7025668ebe9c550a5fa2f1aac8a669d571496cda792f
SHA512c50cb856e077ec3fdb0ed5bc58132aee9519d07587b1e4971db57583f217d19c1b1255e91e0bf5c02399d2e3c8c35922f9f3667d6d31b07cff5a937e2994adc3