Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe
Resource
win10v2004-20241007-en
General
-
Target
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe
-
Size
1.2MB
-
MD5
2b4391106cb993ad3fa94fff2d39c70c
-
SHA1
cc46179bcd3b71e6ee6a08d64cb2c1110cb08535
-
SHA256
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46
-
SHA512
93e196b7214d8a605d95d884f6200affcdd8ae909e81aeec6bf0505799c448949624ddf25a9b0286e433febd81487f4b2b9c92d61c809a41c8ba15b74f77a944
-
SSDEEP
24576:Ytb20pkaCqT5TBWgNQ7auxfOdknzcWCd/Xd106A:hVg5tQ7aux2dknzcWCdPdi5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exedescription pid process target process PID 2156 set thread context of 2268 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
svchost.exepid process 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exepid process 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exepid process 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exepid process 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exedescription pid process target process PID 2156 wrote to memory of 2268 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe svchost.exe PID 2156 wrote to memory of 2268 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe svchost.exe PID 2156 wrote to memory of 2268 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe svchost.exe PID 2156 wrote to memory of 2268 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe svchost.exe PID 2156 wrote to memory of 2268 2156 45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe"C:\Users\Admin\AppData\Local\Temp\45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\45a9ab6797cc7d6ea37308be07621d172f52d59d82ab5bb10adba5ca4c598a46.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD55ce8b0929dc268b24a0fa11d68ea5749
SHA15a2317186d0d2bd103a31969ee69f3ded0ff0057
SHA256406b381696d6e56a0dd7f0be3239f775aecb9be0e6c58e9f93b382e9193123df
SHA512a75b3393290675d7bb03b3b595e0467a9f169f31803e16028f9f8d5e8ee51386f01737015e918d00c1a292d3bd12fe128b79e47b14e7e0293efea493ac7518c4