Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe
Resource
win10v2004-20240802-en
General
-
Target
72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe
-
Size
3.4MB
-
MD5
a788566a61e73cf374dfa51e567195a0
-
SHA1
8a8406f7b1f52737173959da1ae334bf6ac29926
-
SHA256
72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f
-
SHA512
478b8bc344e3c00f78c9beea21d559c10ec3f153f3ff9c2e091bd1a4cc88e84365d21da96b2f0bdfe8d5e10d531a1cee73640f22ba46e9531070e5e4a5dbcef8
-
SSDEEP
98304:jDIBn68FVdPQ7hx66pX4HkWBjHegtSYN4Sh0SsTw5qr1BhZdUmY4guJxu4AF76hc:IDypq7zSYN4C0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2368 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe 2368 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe 2368 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe 2368 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe 2368 72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe"C:\Users\Admin\AppData\Local\Temp\72680e9e880237b9886c659b5d1dd448428b790c81bb69f22e13a7fe6149962f.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5f4587161e6577c88ec8997d31085d6d8
SHA15a8611de1f1dd7f45b6a923c6068b64aa51b9ceb
SHA25639546ce5ce9e0f4788cac393dda2c00fafbab9df1eb68e466d637db8641e0610
SHA512c45f54de0c2d85cf15480a599b5c43d23a815c923986c5def3eef2f029f6dc0934f3f61e65a866a142c388bfd5c7edfb13e0f4618158b5ec58037ff94c8141b6