Overview
overview
10Static
static
1Project-LS...in.zip
windows7-x64
1Project-LS...in.zip
windows10-2004-x64
3Project-LS...ICENSE
windows7-x64
1Project-LS...ICENSE
windows10-2004-x64
1Project-LS...SD.zip
windows7-x64
1Project-LS...SD.zip
windows10-2004-x64
1LSD.bat
windows7-x64
8LSD.bat
windows10-2004-x64
10Project-LS...DME.md
windows7-x64
3Project-LS...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
Project-LSD-Gorilla-Tag-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Project-LSD-Gorilla-Tag-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Project-LSD-Gorilla-Tag-main/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Project-LSD-Gorilla-Tag-main/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Project-LSD-Gorilla-Tag-main/LSD.zip
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Project-LSD-Gorilla-Tag-main/LSD.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
LSD.bat
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
LSD.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Project-LSD-Gorilla-Tag-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Project-LSD-Gorilla-Tag-main/README.md
Resource
win10v2004-20240802-en
General
-
Target
Project-LSD-Gorilla-Tag-main.zip
-
Size
1019KB
-
MD5
d585dbe2c64eac8b5d4b97a961b8cc80
-
SHA1
e901d96b9c5f45f4b656309d47344f62c9077b79
-
SHA256
29fed046e6cb8a389667d00e1762e2dd76cdc2447fb8eeeb1384f16a3840864c
-
SHA512
59c6ea9ee55eb4de8fcca8e69f1f7a8eddc76a646cd0853bd219e3a1492c2c2b29939bddf6d5ac825ca7241c458d11031cc4bc5cb323f54d232a99d21101d74c
-
SSDEEP
24576:thbneG+umDBMroPH8LCyn5IYWaoc7CcqNgoEXy9epuE6VdW/qd:jepumAxC+6YWaH7zoEXWdW/qd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Project-LSD-Gorilla-Tag-main.zip1⤵PID:1236
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4940
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\GroupInvoke.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- System Location Discovery: System Language Discovery
PID:3176