Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe
Resource
win10v2004-20241007-en
General
-
Target
3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe
-
Size
412KB
-
MD5
10d078db0de547135eeaf23d09c0406b
-
SHA1
92fded2c4967fc1951086a2f65ce3886cb7216c0
-
SHA256
3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571
-
SHA512
f73c61b2e7246a0ada95dfe2793ea6f085140bbfd3ba23a1659d09a003f81fa3b3e97b938a706f6307f77f0d8b6622ede909e414dcd6ffa7a645eea2fad444f5
-
SSDEEP
12288:GsE05umZPem7nAW04hrr5px3V2HYbsROAU1lNJ:hZ5u8PemjFrzx3o5RONb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1452 wvcqwzzlh.exe -
Loads dropped DLL 1 IoCs
pid Process 2856 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\nqvutzriy\wvcqwzzlh.exe 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1452 2856 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe 30 PID 2856 wrote to memory of 1452 2856 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe 30 PID 2856 wrote to memory of 1452 2856 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe 30 PID 2856 wrote to memory of 1452 2856 3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe"C:\Users\Admin\AppData\Local\Temp\3c6d8b172382bb7ee3baa81cb04068f066f8adfa8db50c8e00ca968ba6086571.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\nqvutzriy\wvcqwzzlh.exe"C:\Program Files (x86)\nqvutzriy\wvcqwzzlh.exe"2⤵
- Executes dropped EXE
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437KB
MD5f72e88de01c79f3037b198622e36d23d
SHA12e948b8b53d3e2660bef8ab9b7759d90d204d5d8
SHA25694b2b7fa7ef0f83d7bf9bc7fcac1c09568dbaddedc2302e86abd2fc9f8d6bfaf
SHA512b7a570783a31fe87965c9e8a6a6f40f98beef5f2661dba55f8701ad1f75dec639008403942389a0dc884859924a0d08dfd0d4fce21266685f31b53b9c51be573