Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe
-
Size
6.3MB
-
MD5
fa3cfe5874612ace62ac41853200efa6
-
SHA1
d7c6263c99dbc271ac54260bb44c3336ac857ad6
-
SHA256
b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27
-
SHA512
5821483a200038f4dc33999e333b57ce75eb3562a1de454dc23c92570597aa1c5052e922935067345228af4f21269a6315f4c32655412a033cbcf95497e58f69
-
SSDEEP
196608:qu6U45on2gsqqx+6E2PyZWtiRLW//mfg8jpvfD:quN8Y2jqg+6fPyZDfY8Vz
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1308 b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe 1308 b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe 1308 b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe 1308 b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6fb17e3b8dae7036ad95fe90608cf3a673973d3342f42311586672790328a27.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5549ee11198143574f4d9953198a09fe8
SHA12e89ba5f30e1c1c4ce517f28ec1505294bb6c4c1
SHA256131aa0df90c08dce2eecee46cce8759e9afff04bf15b7b0002c2a53ae5e92c36
SHA5120fb4cea4fd320381fe50c52d1c198261f0347d6dcee857917169fcc3e2083ed4933beff708e81d816787195cca050f3f5f9c5ac9cc7f781831b028ef5714bec8
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
9KB
MD5b7d61f3f56abf7b7ff0d4e7da3ad783d
SHA115ab5219c0e77fd9652bc62ff390b8e6846c8e3e
SHA25689a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912
SHA5126467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8