Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 21:44
Behavioral task
behavioral1
Sample
baedawdgh.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
gdwadtyjuesfshas.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
gweadtrgh.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
hjgesadfseawd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
kisloyat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
kisteruop.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pothjmawdtrg.exe
Resource
win10v2004-20241007-en
General
-
Target
pothjmawdtrg.exe
-
Size
439KB
-
MD5
d1ccaa1cdc4f59d2e32065f37e3d707f
-
SHA1
9414747b539af8d60c5a22f750c527601685f234
-
SHA256
07a2cf7b2426399a5ac14c6e5d4ab3f70c3a3b426a79f0a3aacd0c309d75b698
-
SHA512
f67ea08ce5ea5338df21c8a918e4a71901802eccfa350bcf30d22413e5c57dfb7cbaafadebf8fd00032ce2a887c7362a909cde177d022b2778eb8a632f3d059f
-
SSDEEP
12288:1O7k28xC7HMDVBjfbL5S6IZ7OGQN/RutyU3ivG/Tt9:+OS6IZ7QN/R8yoaG/B
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
pothjmawdtrg.exedescription pid Process procid_target PID 1596 created 2604 1596 pothjmawdtrg.exe 44 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pothjmawdtrg.exesvchost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pothjmawdtrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
pothjmawdtrg.exesvchost.exepid Process 1596 pothjmawdtrg.exe 1596 pothjmawdtrg.exe 1596 pothjmawdtrg.exe 1596 pothjmawdtrg.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe 1580 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
pothjmawdtrg.exedescription pid Process procid_target PID 1596 wrote to memory of 1580 1596 pothjmawdtrg.exe 82 PID 1596 wrote to memory of 1580 1596 pothjmawdtrg.exe 82 PID 1596 wrote to memory of 1580 1596 pothjmawdtrg.exe 82 PID 1596 wrote to memory of 1580 1596 pothjmawdtrg.exe 82 PID 1596 wrote to memory of 1580 1596 pothjmawdtrg.exe 82
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2604
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\pothjmawdtrg.exe"C:\Users\Admin\AppData\Local\Temp\pothjmawdtrg.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596