Analysis
-
max time kernel
19s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 17:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c414b40c590124bbfc71ade266ab23e0N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
120 seconds
General
-
Target
c414b40c590124bbfc71ade266ab23e0N.exe
-
Size
949KB
-
MD5
c414b40c590124bbfc71ade266ab23e0
-
SHA1
d8417130e5560a57fa1d17c9e5da7fc650a60791
-
SHA256
315f1e3d80d1c90ca78661d54af9174a53805be85d134d8972018469afc78ce3
-
SHA512
dc16360eb30c04e6c01d2fcffa22fd69d5ce2b5bb1555bd5a2c78a334aeb411ea539f4d5456d3e75135515c3d4602e05094e1ac2de1d6e884718c176b3aa43cf
-
SSDEEP
24576:+73BWaNzR5JN9T1MDSJegoAqiz4Fv+edd8/MLcdoJ:+7RVRn1Mjtiz4keTEddM
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c414b40c590124bbfc71ade266ab23e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c414b40c590124bbfc71ade266ab23e0N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main c414b40c590124bbfc71ade266ab23e0N.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch c414b40c590124bbfc71ade266ab23e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" c414b40c590124bbfc71ade266ab23e0N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 c414b40c590124bbfc71ade266ab23e0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2096 c414b40c590124bbfc71ade266ab23e0N.exe 2096 c414b40c590124bbfc71ade266ab23e0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c414b40c590124bbfc71ade266ab23e0N.exe"C:\Users\Admin\AppData\Local\Temp\c414b40c590124bbfc71ade266ab23e0N.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2096