Analysis
-
max time kernel
10s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 17:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Installer.exe
-
Size
30.0MB
-
MD5
446e059a2fd9b624e0631847c69c4eff
-
SHA1
28f852bb0b3dfaf222cc569391936247ddba0ca7
-
SHA256
7d2630e6b8c1ad2761da45ecb6bb011e34b0a4e1922861763ddf75124031d99f
-
SHA512
bc89e88b90dc9905c7181eaf547dce667f91cdb7508dab508569f6ad02360087f172607438a89fd5d0da6d37a2f6d1f42c6d003a9e0654ca9efd73c2711b890b
-
SSDEEP
393216:NrHzHCocEm3j9kYnq5CIA8F87VzgEFlQ1:NLzH3VIj9k0aCIA
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 2204 2328 Installer.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2204 2328 Installer.exe 87 PID 2328 wrote to memory of 2204 2328 Installer.exe 87 PID 2328 wrote to memory of 2204 2328 Installer.exe 87 PID 2328 wrote to memory of 2204 2328 Installer.exe 87 PID 2328 wrote to memory of 2204 2328 Installer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:2204
-