Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe
Resource
win10v2004-20241007-en
General
-
Target
2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe
-
Size
447KB
-
MD5
7f435b6583827494414e73e029280612
-
SHA1
036505c0ae3279964faca94b6cf6fe8cdba7e3bf
-
SHA256
2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562
-
SHA512
2772674f6cb1552e1dd5a67d1e582ecfa478c22afa486cb5457f3a1f84adf6e79df0f0734c653b01988f4045cd52cc122d805aaa0878becaa46458b830ff4435
-
SSDEEP
12288:SYzGVM3VyJgeE7uXsQeVtBKNkWPam1E60tFEYiJgZxi+tC:SPMl6gl7PJV3KCS0t2YiJOiF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2044 ywqo.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\qjea\ywqo.exe 2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywqo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2044 4528 2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe 83 PID 4528 wrote to memory of 2044 4528 2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe 83 PID 4528 wrote to memory of 2044 4528 2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe"C:\Users\Admin\AppData\Local\Temp\2143b892be3f37a03f0886316339ac5f41bde705ca28c2cb06566b2331122562.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\qjea\ywqo.exe"C:\Program Files (x86)\qjea\ywqo.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD50f5f22a93b421768de70f5661fa4a868
SHA140d589fde6f68847e7aaa7b72fc0ee91d9b443bd
SHA256b8e0b6a2ee2d4cb85364f9d8cbe9ace1bd0b91da4bc3653f2daeed54e6957e96
SHA512478d067500ec3131a2bf480bb05929af8311535cc4c719b7008bfa2b642ba3b504ca41ac9271f9fde48480e77f11888524f77bc5c2e9ac7e0190ed9ef9f5c1ac