Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
lazarus-3.6-fpc-3.2.2-win64.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
lazarus-3.6-fpc-3.2.2-win64.exe
Resource
win10v2004-20241007-en
General
-
Target
lazarus-3.6-fpc-3.2.2-win64.exe
-
Size
204.2MB
-
MD5
f8bfe70d72149e676a5caac273591b09
-
SHA1
bb0856e90773e239757b4df1acd229f8f3eb906f
-
SHA256
568ec39f976d789ad4cfee75c999f1fe4fe0cbf54089a2b26d3b098b9190cc75
-
SHA512
abaa9a44107ff439f5f79efc9be26ffe47509efdcf9cbd6b0a481dddfc02ba06c06e401e459646cd4edf37962e23cd564c550d9da9782195ad200ba56a55da6f
-
SSDEEP
6291456:6vd3wEvYa1wzLabvl/C1+Kj45Qlk5aBUuqGcLYVD3k3n50:s/Aa1mKNC1Fj4mlk5QhUYhk3n6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2932 lazarus-3.6-fpc-3.2.2-win64.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lazarus-3.6-fpc-3.2.2-win64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lazarus-3.6-fpc-3.2.2-win64.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2932 2100 lazarus-3.6-fpc-3.2.2-win64.exe 84 PID 2100 wrote to memory of 2932 2100 lazarus-3.6-fpc-3.2.2-win64.exe 84 PID 2100 wrote to memory of 2932 2100 lazarus-3.6-fpc-3.2.2-win64.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\lazarus-3.6-fpc-3.2.2-win64.exe"C:\Users\Admin\AppData\Local\Temp\lazarus-3.6-fpc-3.2.2-win64.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\is-CA0B7.tmp\lazarus-3.6-fpc-3.2.2-win64.tmp"C:\Users\Admin\AppData\Local\Temp\is-CA0B7.tmp\lazarus-3.6-fpc-3.2.2-win64.tmp" /SL5="$E004E,212389209,121344,C:\Users\Admin\AppData\Local\Temp\lazarus-3.6-fpc-3.2.2-win64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb