Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 08:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a.exe
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a.exe
-
Size
457KB
-
MD5
0370ab8f7dd7979c7c731f39cad5410a
-
SHA1
8c5ba56e4a2759523bbcd205dfc6e52858c33450
-
SHA256
74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a
-
SHA512
2afdc6b0741f3577451acce288e5e9854ff2c9b3e0da1c749ce36355ca1f5e0f238674e5493f047e5f26a102a12939461e608d2a7ad169c4ae59b2e19bb2c0ce
-
SSDEEP
12288:iFANWB8gvAGaDaZqv/mB+6X3NTHagXtM:oAY8gIG4aZqv+BPX3NWg9M
Malware Config
Signatures
-
Expiro payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5088-0-0x0000000010074000-0x0000000010108000-memory.dmp family_expiro1 behavioral2/memory/5088-1-0x0000000010000000-0x0000000010108000-memory.dmp family_expiro1 behavioral2/memory/5088-2-0x0000000010074000-0x0000000010108000-memory.dmp family_expiro1 behavioral2/memory/5088-3-0x0000000010000000-0x0000000010108000-memory.dmp family_expiro1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a.exe"C:\Users\Admin\AppData\Local\Temp\74d6dad0f286be246f9a44dde0d6c1f5ce05b6b7e797cf9c108e78b0922fae1a.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=1320 /prefetch:81⤵PID:3136