Analysis
-
max time kernel
92s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe
Resource
win10v2004-20241007-en
General
-
Target
3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe
-
Size
1.2MB
-
MD5
e20f5cb0fb92c2f0c54b92f999bb02c1
-
SHA1
de317b24cb5b1281a0c21f0b8f7ed2fa0d860eaf
-
SHA256
3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b
-
SHA512
21bc72c47e80eaeaaaaa644f94e93a757a2063f0c87d11b8bbe33155a3a86bf79ffa175ce018d9487377736ff1f3a6b72ef09f81fb15cfcc5fd8cce3297da1eb
-
SSDEEP
24576:jCdxte/80jYLT3U1jfsWajuAaqktrp+Rv0IkWSAQ:qw80cTsjkWajuJwRvCP
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 3976 3592 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe 3976 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3592 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3976 3592 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe 83 PID 3592 wrote to memory of 3976 3592 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe 83 PID 3592 wrote to memory of 3976 3592 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe 83 PID 3592 wrote to memory of 3976 3592 3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe"C:\Users\Admin\AppData\Local\Temp\3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\3edcbe99c45a99d20b5c01fbe549c68b9db2500102058be6a90a4b4baaed362b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5f135d8268fed46103cbaa45e542f1246
SHA10fde4d67e8a35da523b242b175974b74fa5e1ddb
SHA256280e0a94d2f3c758710ceec4f8ecf508111ae4713005ad58984e618a0c50284b
SHA51225ccb571b62f83b25535fa2b8c57a5bdc2baada9e80e84079fba656e608640e891548009dec156ccaf782a18189045d470a982091d1a3b9ac0e113b893842db7