Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 10:10
Behavioral task
behavioral1
Sample
020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe
Resource
win10v2004-20241007-en
General
-
Target
020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe
-
Size
324KB
-
MD5
6afa886e95cdd9d78047f17fd0ab6b45
-
SHA1
247324c3c7672965f57446f18b5b77a5567e19ab
-
SHA256
020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b
-
SHA512
cb1b3f7021881d6fd4f85a8b9a223903554f40e0908fed55a8b9c725dfddc319fc382d5219f403b537464559d4feb74c968bb48c156da813c67c9206b4c19bc5
-
SSDEEP
6144:msYSsp5yL23j0Tj4M6aW4I7NMk5B8k3qX/SCm63P84AO8X3ESqAguOSfmiChsmG:msYSsp5R3j0Tj4XaW4I7NM0B9a0SyxLp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 924 2Qk4F0I9SQDpuu.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Qk4F0I9SQDpuu.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1248 wrote to memory of 924 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 82 PID 1248 wrote to memory of 924 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 82 PID 1248 wrote to memory of 924 1248 020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe"C:\Users\Admin\AppData\Local\Temp\020d370b51711b0814901d7cc32d8251affcc3506b9b4c15db659f3dbb6a2e6b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Roaming\{947f9865-84cf-11ef-bedd-806e6f6e6963}\2Qk4F0I9SQDpuu.exe
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c