Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 10:40

General

  • Target

    04791972d1268538145adcb6e321ce4227a1ca970dafb947ea3d4e2f1df4940b.exe

  • Size

    984KB

  • MD5

    a4ccf083070fd1194f04b3485acce46b

  • SHA1

    4c329f7f2d34494962c7628eadef79254d001a2b

  • SHA256

    04791972d1268538145adcb6e321ce4227a1ca970dafb947ea3d4e2f1df4940b

  • SHA512

    31d604e4c9eb831391088c4ca6c1ff6f1f0fe7765590b9c45cf28af6706c3310c983a1e3ff59dc2070851ba6a5bc87cd6ff00d46c35d4a173f9082ee21ef8a86

  • SSDEEP

    12288:az/QBoovBa3EM6okmAJ95Zzt3uYCBnFlu+JXz7v+Uc4Ata+OE78bM8h:aTQuc+EfoVAHteYNU8I+OE78b

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04791972d1268538145adcb6e321ce4227a1ca970dafb947ea3d4e2f1df4940b.exe
    "C:\Users\Admin\AppData\Local\Temp\04791972d1268538145adcb6e321ce4227a1ca970dafb947ea3d4e2f1df4940b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\CFSZRLH7\www.2345[1].xml

    Filesize

    39KB

    MD5

    f12703af09373883e34fdb8733d4cb98

    SHA1

    c3f4d8f54b1e23f1fe7b73db55be75ca6ec6ca8b

    SHA256

    93edb66d3cc4f6f423eecf00f4f6187eab3b328ff3cfb00ba6062e17a08bfe90

    SHA512

    1809b756d3e23fa6aebc095ecd3a3d2f21de205c9e5c995c655cf73f9aa610a1b42f7cbb2994e9cfa57781ee97a132f5ceb90575c85b69051fd0c51bfe34069d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\gul_init_v4[1].js

    Filesize

    11KB

    MD5

    450be52ac1d5010ab2892a82a3db0d6a

    SHA1

    dbe30a09598e8fb086e3510dfddc43be3e947d0b

    SHA256

    fc70e5dc3856378b0f94ae71eee7ce2a6820836d74b3e44a4c112862fcfd54a3

    SHA512

    929b410e913e81fa52a8531b255bbe1d9d6927952504c3d4ec28ea59e7e40dfae3a8f5a855e4e35b9ffe10b70819c1a140ecde4303f1d870760eba29dd74de9b

  • C:\Users\Admin\AppData\Local\Temp\Cab936B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar938E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2372-150-0x0000000006010000-0x0000000006030000-memory.dmp

    Filesize

    128KB

  • memory/2372-174-0x0000000006010000-0x0000000006030000-memory.dmp

    Filesize

    128KB