Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
setup_snow_plowing_simulator_1.01_ea_(75369).exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
setup_snow_plowing_simulator_1.01_ea_(75369).exe
Resource
win10v2004-20240802-en
General
-
Target
setup_snow_plowing_simulator_1.01_ea_(75369).exe
-
Size
891KB
-
MD5
e08e3114b98888aedfb1f6692796276f
-
SHA1
e88189f790c4493ab7a7f7c0ac9bf0d87a7a2df7
-
SHA256
5f93efa105dec047d9d08095d0c3c6f785ed9b31abec6508b31f011cde1f536e
-
SHA512
5255313f7e903393f5cbe40ac7f3eedf4617c0c9e691b08ff861df6a6aea07585f5e6f92b17f938700420d158f0fe6efa5615e116bdca9c170eb95cce88feb55
-
SSDEEP
24576:Cxct1NC4a9anEySPAXo8augT6cWmjXf2q6yn8FLX:2igDug+Hmjv4gk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4204 setup_snow_plowing_simulator_1.01_ea_(75369).tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_snow_plowing_simulator_1.01_ea_(75369).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_snow_plowing_simulator_1.01_ea_(75369).tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3616 wrote to memory of 4204 3616 setup_snow_plowing_simulator_1.01_ea_(75369).exe 83 PID 3616 wrote to memory of 4204 3616 setup_snow_plowing_simulator_1.01_ea_(75369).exe 83 PID 3616 wrote to memory of 4204 3616 setup_snow_plowing_simulator_1.01_ea_(75369).exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_snow_plowing_simulator_1.01_ea_(75369).exe"C:\Users\Admin\AppData\Local\Temp\setup_snow_plowing_simulator_1.01_ea_(75369).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\is-DAP1R.tmp\setup_snow_plowing_simulator_1.01_ea_(75369).tmp"C:\Users\Admin\AppData\Local\Temp\is-DAP1R.tmp\setup_snow_plowing_simulator_1.01_ea_(75369).tmp" /SL5="$5020A,192512,0,C:\Users\Admin\AppData\Local\Temp\setup_snow_plowing_simulator_1.01_ea_(75369).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ff5ebf66cddd9913b729de78eeb638c8
SHA1ca23d5639d1c516e3defc8f5b267bb5c040238d5
SHA256abf8d4d522ca94a179d644ec0464474b580ec82441b118b663da3bd879f91d85
SHA5124fa3a2dc8ad68bfffc0e039171d2da71c3c37eade709d5495e825bb53f576180eafee57e3c1f78d7dcc8d26e26cc24e1e99bb494d9b4a55f74f4145eb6e5a05b