Analysis

  • max time kernel
    109s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 21:11

General

  • Target

    3cd4a247a6338b1ada9322ce559e1240N.exe

  • Size

    140KB

  • MD5

    3cd4a247a6338b1ada9322ce559e1240

  • SHA1

    878667e2b6952963f3d7725e3a55bcd4b0e6b28b

  • SHA256

    f7765615febb5fde03e57c77bea661fd6336271e0cc4ad4136da71d065ba4270

  • SHA512

    31d86119ef569ae4c3f89cf722d3a60881935500c272bfde8b4133e99be811dfc9d246d22771b2ae552c23611037d1e9bb06737667b3049eba3491e4bd9f203c

  • SSDEEP

    3072:FC+b/xEwBxygI9vj0AT1smXA3HizrYZ6oXHqBNI5x1:k+LxBxULrsr3CffoXKBy5X

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cd4a247a6338b1ada9322ce559e1240N.exe
    "C:\Users\Admin\AppData\Local\Temp\3cd4a247a6338b1ada9322ce559e1240N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4324
  • C:\PROGRA~3\Mozilla\zesgosm.exe
    C:\PROGRA~3\Mozilla\zesgosm.exe -ukpewwc
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Mozilla\zesgosm.exe

    Filesize

    140KB

    MD5

    0ebb2cb8a20a490ea5962b42e0f95ded

    SHA1

    aa135e756dd3c176baf1e07501125b7c5f139576

    SHA256

    7e8af6b22245edc3eccb72d70bc4a069cb2807c02bf914965913708b42f124bc

    SHA512

    ca4a499aca58869501191df501f6de2c621b0dee31200f7b54be9676219bb1718567d7f601abe4ee354dc55af957698f466d1a8895e1961fea8b62951606cb51

  • memory/464-10-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/464-13-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/464-14-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/464-18-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4324-0-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4324-1-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/4324-2-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4324-3-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4324-4-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4324-11-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB