Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
61260ff9bbe5cc7dc53853bf17cb9ff0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61260ff9bbe5cc7dc53853bf17cb9ff0N.exe
Resource
win10v2004-20240802-en
General
-
Target
61260ff9bbe5cc7dc53853bf17cb9ff0N.exe
-
Size
366KB
-
MD5
61260ff9bbe5cc7dc53853bf17cb9ff0
-
SHA1
8b4e1b117bac4dc412c45552daea7a7dc99e99e3
-
SHA256
d5a4402c0b457f43fdc1312c7fc1328760ac48677943e102a04d3f75101f7596
-
SHA512
2a6d2d3d820572f7e9ccd233126939a4396e7272d4524737c4d9053e565b7230c7c1fdde89ef1d945ebd9eb2c4e1f72c29b3ed212e08267cdec372275b263144
-
SSDEEP
6144:SaNYTikOF/YQu03kXtBhxffcZmvwzRwSk2aYKzSNzY3kh6fEmrIz54A6O/DjAFjg:SaNYTikOF/YQu03kXtBhxffcZmvwVwSG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 748 prototype.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\conforms\prototype.exe 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prototype.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 748 prototype.exe 748 prototype.exe 748 prototype.exe 748 prototype.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3980 wrote to memory of 748 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 85 PID 3980 wrote to memory of 748 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 85 PID 3980 wrote to memory of 748 3980 61260ff9bbe5cc7dc53853bf17cb9ff0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\61260ff9bbe5cc7dc53853bf17cb9ff0N.exe"C:\Users\Admin\AppData\Local\Temp\61260ff9bbe5cc7dc53853bf17cb9ff0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files\conforms\prototype.exe"C:\Program Files\conforms\prototype.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD5f46195a7f5c63b4f860c21f633fee836
SHA15504be8e59813c594b3585d99159bd45e7974aba
SHA256083ed94fb97488f3824ede8f0997641fcd14e7f601addc17fe54312cfa0ecc18
SHA512b3b8ff5979c5912a7b347b6cc259231d429d88a77836d8d2b86e848d9a5c37bfc5cc30ae4bd29d0122a920117fbdd1f272cac356dd8308070b6ef192ac59a039