Analysis
-
max time kernel
141s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 01:02
Behavioral task
behavioral1
Sample
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe
Resource
win10v2004-20240802-en
General
-
Target
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe
-
Size
7.4MB
-
MD5
afea68327bd3cb05fea2420848065499
-
SHA1
e057f60b9e54b139e2fdbc63b141533c4946c8d5
-
SHA256
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4
-
SHA512
be1c174bdbff87c38299c880ac93d4959d8048817439511bec59c281f9f1f773d501017cc52963da82ce8941eecd2cf002ed44dc34e3bd4e7ba6b8eec50c9dbb
-
SSDEEP
98304:fiMrdaUIJ3sxQvmzLvqwBOZTcjgxffDjqJbzEwPgo3dkvmnXX:Ki68xQ+zLJOZwjgZ7Utc2X
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4224-1-0x0000000000610000-0x0000000000E0C000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exepid process 4224 039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exepid process 4224 039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe"C:\Users\Admin\AppData\Local\Temp\039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4224