Overview
overview
7Static
static
381581c33df...0N.exe
windows7-x64
781581c33df...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.exe
windows7-x64
1$PLUGINSDI...te.exe
windows10-2004-x64
1$PLUGINSDI...er.exe
windows7-x64
3$PLUGINSDI...er.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
81581c33dfd8c0267f75451889578b50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81581c33dfd8c0267f75451889578b50N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/aspartate.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/aspartate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/remoter.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/remoter.exe
Resource
win10v2004-20240704-en
General
-
Target
$PLUGINSDIR/remoter.exe
-
Size
139KB
-
MD5
fda656c75b581d0dce6537d159052bcd
-
SHA1
a06523896f54e51a1a7269356634cc0bbb069edd
-
SHA256
4ce66c1b06bab37a85a93c5e7d7c9ba6f79da608fab33a00c44b8b0a9443309d
-
SHA512
8e7928c0e0439da880b7f2b036aa4f89cabb365bfe83c17184336580101c96d3b1f2c2ddc254a99a73d7cd0e203c40a1b22f68ad803070d2537c82fb95718106
-
SSDEEP
3072:zs5j0FMPXJKD4va+Rr3LkR8NjQwnSSxAdw0OJfrSheFvIbE7NPNGv6iBDQlU:I5j02Pk8a+R80EwhnJfrSheFgiCQq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remoter.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe 1528 remoter.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1528 remoter.exe