Analysis

  • max time kernel
    115s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 13:40

General

  • Target

    474154665ebc859234a22c787a1d6580N.exe

  • Size

    9.8MB

  • MD5

    474154665ebc859234a22c787a1d6580

  • SHA1

    133af4a447f726d77477224ef059ad350dfff69b

  • SHA256

    d1ae7e3e149273bd773ea3004f8d003031464141a5dbbaff91ea33986b7b5bf8

  • SHA512

    02de4640dfd2e9dd03a3947898a2d1cbd95bcc96d0625d6c656c6cd7589e8d20c83756d977edb5904ef87e7ff92d52f5993d0d5f4cec47f53fde5ab323927561

  • SSDEEP

    196608:ikTqnhgJuP3LAhCiVXOWtkA1oMuWr45hrr2l:vES+LJWeJWGhrr2l

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in Windows directory 54 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\474154665ebc859234a22c787a1d6580N.exe
    "C:\Users\Admin\AppData\Local\Temp\474154665ebc859234a22c787a1d6580N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMReader1.824.29.8644.exe

    Filesize

    9.8MB

    MD5

    74db677209a5c7554b9de31a8995c793

    SHA1

    fec168bfb449893cd239023d9ff4345bc43db01f

    SHA256

    22f95274f4451e52a121d20b9dc4476830c913817c32facffb1ca37c23bbbda0

    SHA512

    f86440f9b765594b62ebf33248d551831ab0476b28bd9bb3b213b050626f77d3a47a274e30fbd1d02d1edb000ed114b12935165cee6360c8c14d7155d70be319

  • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\en-US\RCX9DAC.tmp

    Filesize

    9.8MB

    MD5

    663f658432ae13c61f377a7f1c001a81

    SHA1

    2bb386c149b9a7ebbf8a19f8002153a6b6f19727

    SHA256

    bc008bbc158bfd878f5ee8ce9bd28e0eaee2a627cde607d680a2503f88e66420

    SHA512

    34a8d194c2e98370605d162725043971ebcdb4c4eea710aa1dc29d5419a1f85da297b56dcb395e641cd788866d2927f457d1f7a4bf78fb8759b09e2b470b61c6

  • C:\Program Files (x86)\Common Files\System\Ole DB\en-US\RCX9C81.tmp

    Filesize

    9.8MB

    MD5

    aaa4962ce3291141992e589e863ec4c8

    SHA1

    04fa7b51bcf1efb8fdc8637593106a56637ad773

    SHA256

    fb97015551e76bfdd5cb8d414582f30a14dc3477577dad22a4159f46a4ca93b5

    SHA512

    947fbdc556cb17777f88e1e01a15dae007bbb3e86835e510153618515084eeed7cec8c14af5407574f252fc748368c65c7de81783287445358424c8a376f98a4

  • C:\Program Files (x86)\Windows Media Player\uk-UA\Windowssetupwm.exe

    Filesize

    9.8MB

    MD5

    474154665ebc859234a22c787a1d6580

    SHA1

    133af4a447f726d77477224ef059ad350dfff69b

    SHA256

    d1ae7e3e149273bd773ea3004f8d003031464141a5dbbaff91ea33986b7b5bf8

    SHA512

    02de4640dfd2e9dd03a3947898a2d1cbd95bcc96d0625d6c656c6cd7589e8d20c83756d977edb5904ef87e7ff92d52f5993d0d5f4cec47f53fde5ab323927561