Analysis
-
max time kernel
138s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 14:21
Behavioral task
behavioral1
Sample
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
Resource
win11-20240802-en
General
-
Target
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
-
Size
1.8MB
-
MD5
5a39d66e2b925f7b7f9f39de2f9c5fa0
-
SHA1
86e6f972985fe5c1b857eea5573af476c47b1020
-
SHA256
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658
-
SHA512
3daaa4cff875834fd80ccbde40262403671bdfd2219d61e89eb704d01d94a954421ff0d0a65f0c3c596b4a7662db55af4122f0e9edf15f54196e8c80781f9a04
-
SSDEEP
49152:5F8IrbBBFJLO55rXuLN+KQDVqNbRSbn+MgaLMNEb:8AN39OjEQDcVRU3Lpb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 4884 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe"C:\Users\Admin\AppData\Local\Temp\4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD56976ecea4ca2bc79444685658773beed
SHA1c1071787f6622436653eb68f0587f866e764a9f6
SHA256435d8d8aa76ce83013fb4c9d987cceb7a906ece2155fab71cb8fa7969ebcbbea
SHA5127204569acad7eed3512119116b0df503b10e1ddce4cb2e83885ca33f25e87170fdac3e2f024a5fbd36d6821310731ff82209514151814539c38ef1ff45440442