Analysis
-
max time kernel
109s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
3cd4a247a6338b1ada9322ce559e1240N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3cd4a247a6338b1ada9322ce559e1240N.exe
Resource
win10v2004-20240802-en
General
-
Target
3cd4a247a6338b1ada9322ce559e1240N.exe
-
Size
140KB
-
MD5
3cd4a247a6338b1ada9322ce559e1240
-
SHA1
878667e2b6952963f3d7725e3a55bcd4b0e6b28b
-
SHA256
f7765615febb5fde03e57c77bea661fd6336271e0cc4ad4136da71d065ba4270
-
SHA512
31d86119ef569ae4c3f89cf722d3a60881935500c272bfde8b4133e99be811dfc9d246d22771b2ae552c23611037d1e9bb06737667b3049eba3491e4bd9f203c
-
SSDEEP
3072:FC+b/xEwBxygI9vj0AT1smXA3HizrYZ6oXHqBNI5x1:k+LxBxULrsr3CffoXKBy5X
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 464 zesgosm.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zesgosm.exe 3cd4a247a6338b1ada9322ce559e1240N.exe File created C:\PROGRA~3\Mozilla\ubeuewb.dll zesgosm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cd4a247a6338b1ada9322ce559e1240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zesgosm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cd4a247a6338b1ada9322ce559e1240N.exe"C:\Users\Admin\AppData\Local\Temp\3cd4a247a6338b1ada9322ce559e1240N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4324
-
C:\PROGRA~3\Mozilla\zesgosm.exeC:\PROGRA~3\Mozilla\zesgosm.exe -ukpewwc1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD50ebb2cb8a20a490ea5962b42e0f95ded
SHA1aa135e756dd3c176baf1e07501125b7c5f139576
SHA2567e8af6b22245edc3eccb72d70bc4a069cb2807c02bf914965913708b42f124bc
SHA512ca4a499aca58869501191df501f6de2c621b0dee31200f7b54be9676219bb1718567d7f601abe4ee354dc55af957698f466d1a8895e1961fea8b62951606cb51