Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 04:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
downloader.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
downloader.exe
Resource
win10v2004-20240709-en
6 signatures
150 seconds
General
-
Target
downloader.exe
-
Size
33.2MB
-
MD5
341ed39fa163d3d8f10f1624526ee464
-
SHA1
9d8d0073f951a98a1b4392f258d11e57cd385145
-
SHA256
e0828181a88b0b53156ea5412db23cfd6c515eee9d3c71152bfd69fb6b398b04
-
SHA512
05c847c2dfa5edebc3440e158ee074072150dda2ac0073c4d5c68e5049e47c178ae56f444d993a98c14faa0dbbf0c865acede1df6c9bc5c130e2b09c0bfaf186
-
SSDEEP
393216:d76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yf5nVQx4urYsANulL7Nr:d0LoCOn+25s4urYDNulLBiuP
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\downloader.exe"C:\Users\Admin\AppData\Local\Temp\downloader.exe"1⤵PID:1716
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\PushSplit.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3008