Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
Resource
win10v2004-20241007-en
General
-
Target
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
-
Size
1.9MB
-
MD5
6c35543ffdf0063566d7a1422f894855
-
SHA1
4fef40337fcb757a059d2bcf3ef6bb3629a4066b
-
SHA256
5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366
-
SHA512
1f5e5c4b20e4faedd9f97d11287edef9b52acff11669ff9a5b78f42ed1191c1cbc480e6023f1cef1c429721e4e5cf8047347f8e6bc640e55ab4cc7951ceca07f
-
SSDEEP
49152:Qoa1taC070dEkmXiFPY9o5ikDIPfvt4acv:Qoa1taC0vkmSFPYo5PDInV4acv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4052 9589.tmp -
Executes dropped EXE 1 IoCs
pid Process 4052 9589.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9589.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4052 3144 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 83 PID 3144 wrote to memory of 4052 3144 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 83 PID 3144 wrote to memory of 4052 3144 5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe"C:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 07ED78866F8E0E26C49E516B711CE27CA4693DD48989EA6376B9B25EBB0B085CD8D3065B044C69C3C52104E5B549E0AFD721BD3AC21DB8F4E2BC0B1163EE0BD42⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5013d20d543813374fbae5bf1d70e87bb
SHA1740bb19f7d30e971cd57fb73f08362cf34293585
SHA2562fe6cb23801d3fafd3c5cf512931828fcbd33c7e957615fdb373956aad6e9e5c
SHA5129fc9ba2643d94229f380033ec07e9917f064b604812d02d9e08adb778b3b3e46d446b7538586c79a7c233b6095683f6d0f892cfb11ce2b237795c0e8160ad3bc