Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
6a80fe0788757e718d32f5c5a7ed6a80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a80fe0788757e718d32f5c5a7ed6a80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a80fe0788757e718d32f5c5a7ed6a80N.exe
-
Size
960KB
-
MD5
6a80fe0788757e718d32f5c5a7ed6a80
-
SHA1
390ae783a5c3e18a6c004cbc499542e0eedf0070
-
SHA256
ffbd6372a3c5f36cca7f744e10f0e4ab0463bfd75c83216177ae752a07233e56
-
SHA512
246a01c8b9c80ffa18548f0879f7fb357c4f7c505a4f3a8aec7f2091998c836bf3ea6639d7cc4afa64b04ca144a34f0e3a071096f57324ae90669314a7cc2b5b
-
SSDEEP
24576:/WzXBayYbCPmDm9/jWV7C9l94amTnCODtg+U:/WzXBayYm+qo7CczDtg+U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1384 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a80fe0788757e718d32f5c5a7ed6a80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1384 4360 6a80fe0788757e718d32f5c5a7ed6a80N.exe 84 PID 4360 wrote to memory of 1384 4360 6a80fe0788757e718d32f5c5a7ed6a80N.exe 84 PID 4360 wrote to memory of 1384 4360 6a80fe0788757e718d32f5c5a7ed6a80N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a80fe0788757e718d32f5c5a7ed6a80N.exe"C:\Users\Admin\AppData\Local\Temp\6a80fe0788757e718d32f5c5a7ed6a80N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\a20o0mO5Xi\zXZk9xum\Setup.exeC:\Users\Admin\AppData\Local\Temp\a20o0mO5Xi\zXZk9xum\Setup.exe --relaunch2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD56a80fe0788757e718d32f5c5a7ed6a80
SHA1390ae783a5c3e18a6c004cbc499542e0eedf0070
SHA256ffbd6372a3c5f36cca7f744e10f0e4ab0463bfd75c83216177ae752a07233e56
SHA512246a01c8b9c80ffa18548f0879f7fb357c4f7c505a4f3a8aec7f2091998c836bf3ea6639d7cc4afa64b04ca144a34f0e3a071096f57324ae90669314a7cc2b5b