Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 13:49

General

  • Target

    152b8e1dd2051e56320b4ed579431c80N.exe

  • Size

    842KB

  • MD5

    152b8e1dd2051e56320b4ed579431c80

  • SHA1

    e78cca156d4ecbed1595a7894b50f14c5e7217a2

  • SHA256

    af7b758f0e5c287a1bde21af1f77cf3d88f9a020093014c887cad63bd050e6d6

  • SHA512

    5e06981e5caa318a3d839a029a5548ca583b46e46b72d4b783ba5196b6b41ba9006d178c40da4e3e0de7c1696aa6d0552d84288052727d408aabb19b95087b39

  • SSDEEP

    6144:HwynAtMrOVRkidy9yIGWlUiA2uIJ4O8b8ITDnlznZLZAKzD:HwKfOVRo9yRY/F4O8b8ITDnlLJ

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\152b8e1dd2051e56320b4ed579431c80N.exe
    "C:\Users\Admin\AppData\Local\Temp\152b8e1dd2051e56320b4ed579431c80N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\NPPDF32Adobe.exe

    Filesize

    844KB

    MD5

    5e305cdbc72023f1b5c3b37b350c143d

    SHA1

    7c21d44599f14737fbc9527e6573634a8343f5e9

    SHA256

    cb33bef54a3c2366a9418da12b860c0ccfd484bc6ae85492f04e1e3d175c5263

    SHA512

    803e0741774b46c0c16fa8101271f6c63241d0d0a8a869e2d059ebd7b19a1c954d52eb83007b54f8637dd71cac336ab45f44fc2c56de7599e1b316e89243d282

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFPrevHndlrInternational.exe

    Filesize

    843KB

    MD5

    4e2383b93514bf7395ac002869d16f6d

    SHA1

    8f2951f2bcb55b1be07c903347d2e3c880db3a67

    SHA256

    34c58eee7322f72dc320be06c861ca69299e402b04363ce282c02955f6a30429

    SHA512

    56c75929e5e51c00c25296d42ae6381fca2bdca0b7d48d4a6d11b4a6e20d09ea593fc16b697378653f9ebea7fcf4eaacea613f5820144a52ca2e4053d6c7cd4c

  • C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VisualVSTOInstaller.exe

    Filesize

    842KB

    MD5

    152b8e1dd2051e56320b4ed579431c80

    SHA1

    e78cca156d4ecbed1595a7894b50f14c5e7217a2

    SHA256

    af7b758f0e5c287a1bde21af1f77cf3d88f9a020093014c887cad63bd050e6d6

    SHA512

    5e06981e5caa318a3d839a029a5548ca583b46e46b72d4b783ba5196b6b41ba9006d178c40da4e3e0de7c1696aa6d0552d84288052727d408aabb19b95087b39

  • C:\Program Files (x86)\Common Files\System\ado\de-DE\RCX9A5F.tmp

    Filesize

    844KB

    MD5

    2b654152621a325b335a550edeb02653

    SHA1

    48f5714aa5f921eb2cb60d6820c6b484a122b61d

    SHA256

    1cf61c41e4c896b1cfbc5ed3f34279a51797a9e43edb53c21f70f4204ff6e224

    SHA512

    def5d91fc392f8da7e15ed1de09cfe93f7c82a626a047ea435c43a6e89a2ae479258d71761868f6e185fabe65ad551c3dddc69b38da67b7c815f6e50f0301648

  • C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\SystemPowerShell.exe

    Filesize

    875KB

    MD5

    75d6f59690910ed8c81bf8dd1398976a

    SHA1

    8cce3b2f6ff317cbf29ad65b20063512fe922c0a

    SHA256

    6693adeb536017200fdd795db1a2399c343d9f58054d62047f20278453970a73

    SHA512

    12f242dea7688189453a5d2713c56fb043cb6ce6d0fc82ab13e92898bf467df5a025ceca04eacbebb93ad2a985d0c919e5536bd1814e37ab0909165785fd3049

  • C:\Windows\SysWOW64\IME\IMETC\applets\WindowsWindows.exe

    Filesize

    850KB

    MD5

    20aa40bb546d1f25f617ee034d309d09

    SHA1

    13b35907963177747ec95021d095a68919c530b7

    SHA256

    1b7ed14602cfcb3613fc9afa4a4a2eda9048851e235f60790c229cf06f24279e

    SHA512

    5267ad52b874d90d38258904cae12166383c9c1c5d7316d303f7fdbd2d20a689b1de59a3147c553aa7b304a22d9f1b1556b249ed5831efd243b6bc8f2d57d18d