Overview
overview
7Static
static
3b88f404396...0N.exe
windows7-x64
7b88f404396...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
b88f404396152eb5a200b6f80957cc30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b88f404396152eb5a200b6f80957cc30N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
7za.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
7za.exe
Resource
win10v2004-20240802-en
General
-
Target
b88f404396152eb5a200b6f80957cc30N.exe
-
Size
292KB
-
MD5
b88f404396152eb5a200b6f80957cc30
-
SHA1
0de4f7554f8077ba7171e08dff72f3a80edd01e1
-
SHA256
9d3af8e6305749e14ad341f3b31314578a1708171645a3cec3ed4b9cc8be36ab
-
SHA512
93e96665d91a574d16cf116058dbb214deb69ba92461a5f53b7037df6d028dde5cda2c169a899350d749abcb316ca57188b9de6cb8f3fe2cb9d7c1e37fccb934
-
SSDEEP
6144:kQ3Z31PnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2n:P3dnM3D0Fw/tN8dkmLtpHHHrh7W
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1956 b88f404396152eb5a200b6f80957cc30N.exe 1956 b88f404396152eb5a200b6f80957cc30N.exe 1956 b88f404396152eb5a200b6f80957cc30N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b88f404396152eb5a200b6f80957cc30N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c