Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 23:12
Behavioral task
behavioral1
Sample
788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe
Resource
win10v2004-20240704-en
General
-
Target
788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe
-
Size
138KB
-
MD5
151bcf0a8f31d45e55a5dfdb4ed5c18d
-
SHA1
ac5d9feb3692254938c8f38d96bc774f399523bf
-
SHA256
788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0
-
SHA512
dbe81a49d3498b0619e79ebee8f84b48eb1ba9be9648c00d17ea0df33257a9e8f3f724e02b775058b9c74ea1185c9f4166802dc4585ba326d929bdb9bc76d5cb
-
SSDEEP
3072:AE9ByF5wP7Ht99mbaa+vKAzWvSVJSwpi6Ds9/w:7907wTr9mea+i6WKQ2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral2/files/0x000b00000002337d-7.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2892 ohdwqhb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ohdwqhb.exe 788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe File created C:\PROGRA~3\Mozilla\hptnfde.dll ohdwqhb.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohdwqhb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe"C:\Users\Admin\AppData\Local\Temp\788a74a32dafd485cd44bdaf53bc2e30f59efaf1b4f5f178de605bb194d0cff0.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4636
-
C:\PROGRA~3\Mozilla\ohdwqhb.exeC:\PROGRA~3\Mozilla\ohdwqhb.exe -kpjhkwk1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD504f93abb6c76e5686121d7cfb37f03d8
SHA1031b446a3b17969d2393272678a453b969660ec2
SHA2563a85f48cc8e6dc6333628a16a4aff6ec3b8a5c52ea37fae746726f1cae24c69e
SHA51220635eff6d8cb037d80ae8206fcf7c1e81ec9509637a166ef1c8907b0066c1a66ff6d88e4606042dceb93d2a1aa43d8a200f514f26726e1ab7e4086d66c83f77