Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
aafa02ccfc3a6d59d506534ed2ebc070N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aafa02ccfc3a6d59d506534ed2ebc070N.exe
Resource
win10v2004-20240709-en
General
-
Target
aafa02ccfc3a6d59d506534ed2ebc070N.exe
-
Size
174KB
-
MD5
aafa02ccfc3a6d59d506534ed2ebc070
-
SHA1
a1cd28bcb39b4460d060ef1372b4c62fbe7f0e95
-
SHA256
1231486611b9aa5e40cfd43654c2640db1627687a3c7316872dd70e4b4e7ea47
-
SHA512
245426d217dd31a236854fdba153ee734787338c6fd6a27043f82ac1d0a7a454bac4e73da1340df0e8ebe5f62cb22a6b71d4892af9391b27dcd3e5edf1e526f4
-
SSDEEP
3072:4MftVuhLf/Y34erRHjgrsX5KYFAM5vTK3clMdisNDtI1rEMe7HzDqRA:M3Y3JdmsJaIOiWDKrA3DqRA
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 4712 amwoxye.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\amwoxye.exe aafa02ccfc3a6d59d506534ed2ebc070N.exe File created C:\PROGRA~3\Mozilla\zfeqbre.dll amwoxye.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aafa02ccfc3a6d59d506534ed2ebc070N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amwoxye.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aafa02ccfc3a6d59d506534ed2ebc070N.exe"C:\Users\Admin\AppData\Local\Temp\aafa02ccfc3a6d59d506534ed2ebc070N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3008
-
C:\PROGRA~3\Mozilla\amwoxye.exeC:\PROGRA~3\Mozilla\amwoxye.exe -wkgszrd1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5ba3ffe2d6478c0b5576bc9b4b0e63748
SHA1af405fe8cf3482ac823207286a8b897e124a20f5
SHA2564b3ee3a8703909a798f19edd6f25d7829a991fcc26956edb4595c12450c3d439
SHA512a5989f7539d850aecd416b3ac9a8adaa479daedff692ac565c33110937c24c25cb432830268fdfdc06929f2bf0c327b0a228ad931ff4a9a1002357ab0c391cf6