Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe
Resource
win10v2004-20240802-en
General
-
Target
2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe
-
Size
3.2MB
-
MD5
aee4dd798da9f13ac44fcd2eb5b6b296
-
SHA1
7079918f2ae966e78f7f234c088ce1feb7db00b9
-
SHA256
2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166
-
SHA512
95b6d31aa2ce2e9a58a23568f9e4cfd5fd13fe4e23bd71fb1218a45c17b0a273d8ac546414beb022f4386ffaacc34591d8a0b12c0e287197a5b52fbeea345a5b
-
SSDEEP
98304:KkLLYuywfUx3Dbmy9DwvXlIfYjpo0Njo8:FL5GbmyuXlIApokjL
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 1 IoCs
pid Process 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp -
Loads dropped DLL 2 IoCs
pid Process 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp 3336 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3336 3220 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe 86 PID 3220 wrote to memory of 3336 3220 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe 86 PID 3220 wrote to memory of 3336 3220 2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe"C:\Users\Admin\AppData\Local\Temp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\is-LKDG9.tmp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp"C:\Users\Admin\AppData\Local\Temp\is-LKDG9.tmp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp" /SL5="$50264,2487297,845312,C:\Users\Admin\AppData\Local\Temp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-LKDG9.tmp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp
Filesize3.0MB
MD50d041f22d598f3a63bdf0e66c448bdab
SHA1591fc72ec32e7efe2e641dba38c3cd7b6d415450
SHA256e6b54015c403e3016b848b18fc488d4d281a752bc9ab2a3324ba4d8efb642563
SHA5125dd3af37f06f308f348213c0305acab38cf279556c12a9b14d0343072b1f431778c75129715a2b04abcf219baaeba665faa08fcb4692d2ede36b2511178de210
-
Filesize
2.6MB
MD5347530853fd2439ce98bd9a4faf643a0
SHA15becda68c81b692a7352840a8d8841023cba7e93
SHA2566280e78986521f8662e1408d7cfe3bab343aa043e4fa15c8fe9b424306b194d9
SHA512d9be9bfe254d4c7297034d481ce6144d85a0a5c9cdf20c7d6906ea2091239ab39d26b9d7b651a750a16cbb7d984a0ffdf69027d97a6dc8bcca1a2fa162b88dfe
-
Filesize
283KB
MD5b53e08b82850626c046a5cebd295e41c
SHA1086cbe08eba3fdc68371f46ee29e6dbeaa5d6876
SHA2565120508b7cbdee3d9c89c8ece6e95c9bee018c4e09f13d5e0e2f7cf99828d0c6
SHA512d76ae06d131450b5590e1c816615ad0b7bacfd648e34a69340c2c68c498d0670e3384dfa4d258064f66f590c512fdc5fddabfb55776fb729ab51c0cbfd4050be