Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe
Resource
win10v2004-20241007-en
General
-
Target
193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe
-
Size
1.9MB
-
MD5
68bf0594c0ecc1b3658c0874ea5f0db5
-
SHA1
78a8d3ac2795e0480c8a2751a07d9637e1ab6c05
-
SHA256
193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270
-
SHA512
c72c44d08973459e033799300fc912f5b517e46a7efd4434e1d195dcccdece9ba7b6d04734e2e3ba83d5fae819db216b649ac22af71740692b067af5d0ab6b4b
-
SSDEEP
49152:Qoa1taC070dE2LM30MjlMfIITJurtF9Z3d:Qoa1taC0V2LM02lkPUrrvd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1584 9C40.tmp -
Executes dropped EXE 1 IoCs
pid Process 1584 9C40.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9C40.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1584 2684 193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe 82 PID 2684 wrote to memory of 1584 2684 193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe 82 PID 2684 wrote to memory of 1584 2684 193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe"C:\Users\Admin\AppData\Local\Temp\193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\9C40.tmp"C:\Users\Admin\AppData\Local\Temp\9C40.tmp" --splashC:\Users\Admin\AppData\Local\Temp\193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe 969E5BE158A4D84DB6E6704A2E412437DC4D47A5B38EB718B16BAEE44E6056DD8663E6DB25E0B696EB18ADA2A763806097716722418697DBA95A882DFF14FFE12⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD53f8e1cf48820b362252cb5cc74242bd7
SHA17d21d427fe396f69e0ae19d424d036a193676f8c
SHA25635e0ac02fc713147bab47029feaecfd789dd21a6922e9479d1260d37c1597266
SHA512e44650e2aa28ddba2b4140b48828ce5e37ebed8d4573db937921e12202ade8cf97637ffc68e5c4b73df535c9d5ec18e104ef88413ee35e7e05a4d6f029d6df25