Analysis

  • max time kernel
    19s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 17:21

General

  • Target

    c414b40c590124bbfc71ade266ab23e0N.exe

  • Size

    949KB

  • MD5

    c414b40c590124bbfc71ade266ab23e0

  • SHA1

    d8417130e5560a57fa1d17c9e5da7fc650a60791

  • SHA256

    315f1e3d80d1c90ca78661d54af9174a53805be85d134d8972018469afc78ce3

  • SHA512

    dc16360eb30c04e6c01d2fcffa22fd69d5ce2b5bb1555bd5a2c78a334aeb411ea539f4d5456d3e75135515c3d4602e05094e1ac2de1d6e884718c176b3aa43cf

  • SSDEEP

    24576:+73BWaNzR5JN9T1MDSJegoAqiz4Fv+edd8/MLcdoJ:+7RVRn1Mjtiz4keTEddM

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c414b40c590124bbfc71ade266ab23e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c414b40c590124bbfc71ade266ab23e0N.exe"
    1⤵
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads