Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
Resource
win10v2004-20241007-en
General
-
Target
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
-
Size
1.9MB
-
MD5
6c35543ffdf0063566d7a1422f894855
-
SHA1
4fef40337fcb757a059d2bcf3ef6bb3629a4066b
-
SHA256
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366
-
SHA512
1f5e5c4b20e4faedd9f97d11287edef9b52acff11669ff9a5b78f42ed1191c1cbc480e6023f1cef1c429721e4e5cf8047347f8e6bc640e55ab4cc7951ceca07f
-
SSDEEP
49152:Qoa1taC070dEkmXiFPY9o5ikDIPfvt4acv:Qoa1taC0vkmSFPYo5PDInV4acv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 5B2B.tmp -
Executes dropped EXE 1 IoCs
pid Process 2684 5B2B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2400 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2B.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2684 2400 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 30 PID 2400 wrote to memory of 2684 2400 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 30 PID 2400 wrote to memory of 2684 2400 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 30 PID 2400 wrote to memory of 2684 2400 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe"C:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"C:\Users\Admin\AppData\Local\Temp\5B2B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe CAD9DE7004DEE5B6D847C888135A0101315FBDC5C583740A03F451C52E768DE923AFA82E5628BC024D37F3802F80675E87C6B33199120ADC3DA6190926C40FDD2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD510d22a71e9b76dcb24150ee1cdc031a1
SHA17080e1dab2e2236b0a1401057518768f06017457
SHA256599a49db011913adf6243ca43c888ed0141adc0202b90e288654a5e4520ec8c5
SHA51243c33d9148eefac578ee7b5d3e3ba90049bf92db5993137c1d0ca88b0a4691cc6dfbc326133e495fd447a39a3d9210bb95e49fe512a228350e52a49afb4f79d0