Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 21:30

General

  • Target

    437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976.exe

  • Size

    9.7MB

  • MD5

    72eb240ffd1678f6b6eb7ec26c81e980

  • SHA1

    a927117831ee2132025616e68ad182cd744d4b39

  • SHA256

    437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976

  • SHA512

    e399f82f9d3f7bfe5663da0df23e140608c5283d98af6a10e3b72205083dbeb155d4e9f44e218603b99f6e55e5f6600eb16f037c4108414dc26805041f102d31

  • SSDEEP

    196608:rbqnhgJuP3LAhCiVXOWvd6A1oMuWr45hrr2u:wS+LJYeJWGhrr2u

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976.exe
    "C:\Users\Admin\AppData\Local\Temp\437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icudt58Viewer.exe

    Filesize

    9.6MB

    MD5

    826d75465b21c30a75e2bcdeb8c8a9d3

    SHA1

    caee6266d9b387ffd14667b1525a360981b71250

    SHA256

    bf9b8c743057dd8c0dc42c37bd644eaf45b0df03909a7a9562f782ce903a3372

    SHA512

    13bed6614d97d77903834dbc5adf1e6814fd9f3b65078576342e3aa5cb8acc61e1f0e9aed34db53da9c6df7565cb9f82e74dcc3c352fb0ecae957729cdc1bebe

  • C:\Program Files (x86)\Common Files\System\de-DE\WAB32resMicrosoft10.0.19041.1.exe

    Filesize

    9.7MB

    MD5

    72eb240ffd1678f6b6eb7ec26c81e980

    SHA1

    a927117831ee2132025616e68ad182cd744d4b39

    SHA256

    437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976

    SHA512

    e399f82f9d3f7bfe5663da0df23e140608c5283d98af6a10e3b72205083dbeb155d4e9f44e218603b99f6e55e5f6600eb16f037c4108414dc26805041f102d31

  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\MicrosoftPlayReady.exe

    Filesize

    9.7MB

    MD5

    e05b437f5b33381999d83b03b22dc39b

    SHA1

    76640666bd8bf502634b177f45dbd6bf72ce1bdf

    SHA256

    17166fde5c630d9c243551b1f3434c44f81e0b84d391617f459a5e51cadd1b6b

    SHA512

    e050c23eeb2169eb6a2829a7c288c63f53beb85cfd908500f61b58873ebf80ef234cc85b2c59d8bc649c220bea31cd4dff12e1ca764c34c4ed928ea72c7021f8

  • C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.Protocols.Resources\2.0.0.0_de_b03f5f7f11d50a3a\RCX5F7F.tmp

    Filesize

    9.7MB

    MD5

    646d6992d20a2bd6694eef7bdc23e4e0

    SHA1

    f32b0bec56cb3f941248730ce12a2b47219d586c

    SHA256

    24a6fcb3c7f452b92feaefe89ab537a12a4f111c316ca5f7bcd451633dbe1536

    SHA512

    7252593c934530719755dd31fa6ef46251700fdb4576d6df9352e4f829c547be1fa7ae70cf31ef82a025f54c5e10fe4ad31e07cb66f35d049fe3405cf782d342