Overview
overview
7Static
static
3a78e08d428...0N.exe
windows7-x64
7a78e08d428...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
a78e08d428ebbff27ad6272801638060N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a78e08d428ebbff27ad6272801638060N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
7za.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7za.exe
Resource
win10v2004-20240802-en
General
-
Target
a78e08d428ebbff27ad6272801638060N.exe
-
Size
292KB
-
MD5
a78e08d428ebbff27ad6272801638060
-
SHA1
fb547656e9a8c8b5c49a0107363fbe8314161509
-
SHA256
f462c9710093a1c111f453a890ed107a2575aba1a3cc57911fa28d158126d1db
-
SHA512
f5d9b8c746b2a6e002c2d15c24cb0cf34e3742e70686f911dcc7e656d74ffb0cd7d7e9ec9505c7f1c6bf373cb29ec8e50ca9f2a06e399b857b2b776729e3c54e
-
SSDEEP
6144:VQ35BTQMnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2:cBcMnM3D0Fw/tN8dkmLtpHHHrh7
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 3664 a78e08d428ebbff27ad6272801638060N.exe 3664 a78e08d428ebbff27ad6272801638060N.exe 3664 a78e08d428ebbff27ad6272801638060N.exe 3664 a78e08d428ebbff27ad6272801638060N.exe 3664 a78e08d428ebbff27ad6272801638060N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a78e08d428ebbff27ad6272801638060N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c