Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
a483abcdf8910fb1e52e08859b98e5f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a483abcdf8910fb1e52e08859b98e5f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a483abcdf8910fb1e52e08859b98e5f0N.exe
-
Size
507KB
-
MD5
a483abcdf8910fb1e52e08859b98e5f0
-
SHA1
323ad940b4d1e1a504f71a594524ebe2ccb1294f
-
SHA256
2947186b2417ed36094d964183daf2dd5afb9e9e3140528f6152a6717a6bde49
-
SHA512
50950f4d62fc3f7f9a67cab9f0293316e530343db4ad05dd45c2b0b6638ccfdebb5f1bf64f148a9dc244c75b52d10fe0584bdbf53281fa6c22ebd35d976cd88f
-
SSDEEP
12288:8X/6dDqPkhJhW4KlYdMTUA8j0q7g2iZ1gwrRSUA8:+6dDqPk/QYdMTP2bwrwUA8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4068 EXE85F9.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a483abcdf8910fb1e52e08859b98e5f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE85F9.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4068 EXE85F9.tmp 4068 EXE85F9.tmp -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4068 1880 a483abcdf8910fb1e52e08859b98e5f0N.exe 85 PID 1880 wrote to memory of 4068 1880 a483abcdf8910fb1e52e08859b98e5f0N.exe 85 PID 1880 wrote to memory of 4068 1880 a483abcdf8910fb1e52e08859b98e5f0N.exe 85 PID 4068 wrote to memory of 756 4068 EXE85F9.tmp 88 PID 4068 wrote to memory of 756 4068 EXE85F9.tmp 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a483abcdf8910fb1e52e08859b98e5f0N.exe"C:\Users\Admin\AppData\Local\Temp\a483abcdf8910fb1e52e08859b98e5f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\EXE85F9.tmp"C:\Users\Admin\AppData\Local\Temp\EXE85F9.tmp" "C:\Users\Admin\AppData\Local\Temp\OFM85FA.tmp" "C:\Users\Admin\AppData\Local\Temp\a483abcdf8910fb1e52e08859b98e5f0N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:756
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
980KB
MD534cabedafaf5ce498d245242ac48670e
SHA17a78f2a64618448f8118203f3c7225f6f84622d0
SHA2566dbefd357dc6ad020b5f4c7597312029094bdf9cc08bf2ae911bb2617ab28b39
SHA5126801b911e4272093129cea416d4e8334250f6d393b4d634d251c22922f5c1906516cf53e2958011e7cb3e2a3e86ba74ea2547bbbcaba210db375ac0a6152fe18
-
Filesize
112KB
MD5f3c8a8c15fe6f722d606c97051f7490f
SHA154608f6370d8d337450edab13293f0faa252d542
SHA256ec57591f4ed6bfc64b57d5394a2ce93c2846643d1d92b4601f2c1c98728b2571
SHA51238b9bf182a6d973746e60d5f39f4fafe8e2843086b6e83f63beb63bfc56148b5e4a81a7fd21cb686046f236f81c2873add7ee4ecee3d5cf2a658c4041d534b87