Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 05:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
150 seconds
General
-
Target
42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe
-
Size
10.6MB
-
MD5
ec2bf9b79bca5436f0ef84fc5d02d2af
-
SHA1
3e084fbbfb7bdad5f604d58c6fd79662c8118357
-
SHA256
42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c
-
SHA512
5b5a8ddd4eb2ee4c94375401838be35754cee6cf20871e4185827467051dfdb74e1870491645eb51ce5b735f3af2b1525e8e3ce96e01cd2d69a03c2e7b4b8655
-
SSDEEP
196608:4kof9kDrtepOYGTm51E3boej9nTY6RtKgyTccRCE7jHJJLU+:ifmE37wboInT9Rt1yTcVajHXI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4392-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4392-14-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe 4392 42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe"C:\Users\Admin\AppData\Local\Temp\42644a180d92b20438b574068152ea3f79ee118349c856432bd71c9a12dac21c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4392