Analysis
-
max time kernel
143s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
Уведомление_№_24357 .exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Уведомление_№_24357 .exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
Уведомление_№_24357 .exe
-
Size
501KB
-
MD5
c4c375f69c3ebefeea18902c243aadf6
-
SHA1
f0f00fcda8a6f3cb404a594a23d5e0832c3ea097
-
SHA256
dcf75115c57c8f9692d6ce51c4b5e7a8a8d1616598e50fe42aa4087be5845fc4
-
SHA512
8d9da0bf0edc9e332edcc88ed26bb1a8bf0a703f073cd0b15628c4892324b45da60447eddbcaf1afd10086a03766921c856c25b6a49e1e9a068b528caa5d11bc
-
SSDEEP
12288:8Y2o/nbZrTXNn7B9P1+ym8HbCn8yQMwOV/a1ug+Cw:8Y2WxdXP1+ym82nkMwOV/a1uZCw
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4620 Уведомление_№_24357 .exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\udsprge.ini Уведомление_№_24357 .exe File created C:\Program Files (x86)\Aareladningen9.lnk Уведомление_№_24357 .exe File opened for modification C:\Program Files (x86)\Aareladningen9.lnk Уведомление_№_24357 .exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\annoncerede.del Уведомление_№_24357 .exe File opened for modification C:\Windows\resources\0409\satori.ops Уведомление_№_24357 .exe File opened for modification C:\Windows\biopsychical.tub Уведомление_№_24357 .exe File opened for modification C:\Windows\Fonts\Nednormeres84\vrouw.ini Уведомление_№_24357 .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Уведомление_№_24357 .exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834B
MD5890c4ac8d88f269b9c1823cb10b61cce
SHA1e877ed1056968f0711468eff7386bf283b59029a
SHA256a896df9642d2728cb70c61ff30176f329eeb62711c44c86e89abe4d34d92dd0a
SHA5126e1f89b158f90a6263c6e104dd7d126d64c6d5e1c8b5eaa4942b4309ad5ecf639f36ccf396b2f576f80fdd14c8057c413dae4fc716f3a8ccb5a0118615a255e4
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
32B
MD51edd842653739b3e4e739819666d770d
SHA1a522290cc79af78ebc16dce41ffdae939a553766
SHA256463b9ed24cfc842af86f043ab6a13005b36a15b7e1ff4ed493c02c25499463b6
SHA512889a339ac677ef4149e3a284a0922ec63e28019657be0a80b5042551f0bf9f6c05adae39f94fb95a779c951f5db7315b1b2325245221aec06f8175e02f28a054