Analysis

  • max time kernel
    83s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2024 01:15

General

  • Target

    e4a5552903a2dca67bd48a42adbaab88ae1cc352199a12c66f65c41540494e6c.exe

  • Size

    5.6MB

  • MD5

    15767f0c4baf2306204f8a18c4b5d815

  • SHA1

    15836eaf6fe19222b4c49a2e1554d66b6436a509

  • SHA256

    e4a5552903a2dca67bd48a42adbaab88ae1cc352199a12c66f65c41540494e6c

  • SHA512

    b0c2973fc6d894cc380e51094522a2bf966828e2be11b51a9aacebd8067d845f530b6fa2e7b0a6ffefa4cefd9b81c90026f60a810d56fcc331ed19d7774a7652

  • SSDEEP

    98304:0k6fySOV4iCLKvGCZYmim5BCrIGjJCaottX5GNu6Yiv1:0k6qSOOiCOvGCu3k2otts/1

Malware Config

Signatures

  • Detects HijackLoader (aka IDAT Loader) 2 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a5552903a2dca67bd48a42adbaab88ae1cc352199a12c66f65c41540494e6c.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a5552903a2dca67bd48a42adbaab88ae1cc352199a12c66f65c41540494e6c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2864-0-0x0000000000400000-0x00000000009B2000-memory.dmp

    Filesize

    5.7MB

  • memory/2864-1-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2864-2-0x0000000000400000-0x00000000009B2000-memory.dmp

    Filesize

    5.7MB

  • memory/2864-3-0x0000000073F30000-0x00000000740A4000-memory.dmp

    Filesize

    1.5MB

  • memory/2864-6-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB