Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 02:15

General

  • Target

    b06461681b197b594ce94e448a5d37b0N.exe

  • Size

    216KB

  • MD5

    b06461681b197b594ce94e448a5d37b0

  • SHA1

    460445341939cb2cdd385fb4cfdfd6a1b29c570b

  • SHA256

    14a68f6897a1184534129982147aff9405130d87f4fc5afab461530984a6fd50

  • SHA512

    154d4c7287d5a7fb71373f2e9d8396dafca47ef7b296112c74b26221babd17e1c9a5881bade4077c6da45904734d418d27b03effd4bcca031b7af7910155b2c1

  • SSDEEP

    3072:HgMRUseV3VZ9CL21CaHsOHVeQeH9bdPi2bElE8LOOOOyIk3Zmokfp:AMahnfy21DMOILH95PLQROOOOyRmoS

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b06461681b197b594ce94e448a5d37b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b06461681b197b594ce94e448a5d37b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4484
  • C:\PROGRA~3\Mozilla\qmaeobe.exe
    C:\PROGRA~3\Mozilla\qmaeobe.exe -tubeilc
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\qmaeobe.exe

    Filesize

    216KB

    MD5

    637d7fac9650e5246ba16a8d8282a05a

    SHA1

    7822983f7fe83bf254ff3ae1d6b4b115d7745e9f

    SHA256

    f3461c75e9049c4a41089eaed3977dd722d4c0e5e92694acf4e7be707a893e91

    SHA512

    aa3bf2e401be0112bf11ba7354c44609dcfddf72489b9104ba536dd7de365165248f062de3565c4ee7c689d9b5c2c07d36052005ed3bf26405e37edd9f198d82

  • memory/1452-5-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1452-6-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1452-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4484-0-0x00000000021D0000-0x000000000222B000-memory.dmp

    Filesize

    364KB

  • memory/4484-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4484-7-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4484-9-0x00000000021D0000-0x000000000222B000-memory.dmp

    Filesize

    364KB