Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/08/2024, 14:21
Behavioral task
behavioral1
Sample
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
Resource
win11-20240802-en
General
-
Target
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
-
Size
1.8MB
-
MD5
5a39d66e2b925f7b7f9f39de2f9c5fa0
-
SHA1
86e6f972985fe5c1b857eea5573af476c47b1020
-
SHA256
4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658
-
SHA512
3daaa4cff875834fd80ccbde40262403671bdfd2219d61e89eb704d01d94a954421ff0d0a65f0c3c596b4a7662db55af4122f0e9edf15f54196e8c80781f9a04
-
SSDEEP
49152:5F8IrbBBFJLO55rXuLN+KQDVqNbRSbn+MgaLMNEb:8AN39OjEQDcVRU3Lpb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe 5300 4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe"C:\Users\Admin\AppData\Local\Temp\4f91f9c5d3baf612a1920ae8b2c49a1ee9850d018e308f8e65184a9046138658.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD517c913165e8612c15c8f95a1fe2aa6a9
SHA1fc0f858524b09980a6344581983f9ea2ddb48976
SHA256089c099101f15447447a16fa41acd7895e11429a53fb0ba92ce9f3dc1e4cffd8
SHA5129344af9db9318c9d61125282bd64857765f53c82e81e0c461eefa22d83bb62b29bb11814ea77e57963661896b19aef0f683a8d178ab99704251770c58f86ccb4