Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
b06461681b197b594ce94e448a5d37b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b06461681b197b594ce94e448a5d37b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b06461681b197b594ce94e448a5d37b0N.exe
-
Size
216KB
-
MD5
b06461681b197b594ce94e448a5d37b0
-
SHA1
460445341939cb2cdd385fb4cfdfd6a1b29c570b
-
SHA256
14a68f6897a1184534129982147aff9405130d87f4fc5afab461530984a6fd50
-
SHA512
154d4c7287d5a7fb71373f2e9d8396dafca47ef7b296112c74b26221babd17e1c9a5881bade4077c6da45904734d418d27b03effd4bcca031b7af7910155b2c1
-
SSDEEP
3072:HgMRUseV3VZ9CL21CaHsOHVeQeH9bdPi2bElE8LOOOOyIk3Zmokfp:AMahnfy21DMOILH95PLQROOOOyRmoS
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1452 qmaeobe.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qmaeobe.exe b06461681b197b594ce94e448a5d37b0N.exe File created C:\PROGRA~3\Mozilla\dalbirl.dll qmaeobe.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b06461681b197b594ce94e448a5d37b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qmaeobe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b06461681b197b594ce94e448a5d37b0N.exe"C:\Users\Admin\AppData\Local\Temp\b06461681b197b594ce94e448a5d37b0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4484
-
C:\PROGRA~3\Mozilla\qmaeobe.exeC:\PROGRA~3\Mozilla\qmaeobe.exe -tubeilc1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5637d7fac9650e5246ba16a8d8282a05a
SHA17822983f7fe83bf254ff3ae1d6b4b115d7745e9f
SHA256f3461c75e9049c4a41089eaed3977dd722d4c0e5e92694acf4e7be707a893e91
SHA512aa3bf2e401be0112bf11ba7354c44609dcfddf72489b9104ba536dd7de365165248f062de3565c4ee7c689d9b5c2c07d36052005ed3bf26405e37edd9f198d82