Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:36
Behavioral task
behavioral1
Sample
faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe
Resource
win7-20240903-en
General
-
Target
faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe
-
Size
216KB
-
MD5
f8ad5873fdab53e5cc812297085ac7d2
-
SHA1
8315ca33dbc102cefe5b19f42b0941418ba5fcfa
-
SHA256
faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d
-
SHA512
69dc0048701b6dd8662bae5688cfeccaf0ca3f2e3a6d94da4e4cbe11dbbbe00440e6ce4d67a76156962f4286d9e58186f11e5fdc77b1db43bda07862630c4b70
-
SSDEEP
6144:LPSPnleo/L1WQkzO/YcRVCh7EC/cnA8dfAN:zSNeo/5VV/9RVMcnAofAN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2992 faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe -
resource yara_rule behavioral1/memory/2992-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral1/memory/2992-7-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mghrLua.dll faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe File opened for modification C:\Windows\SysWOW64\mghrLua.dll faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe"C:\Users\Admin\AppData\Local\Temp\faa8fec2c73584791992153561ce13bcc1748f4430a744e87cda7797ed9d7d6d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5756049653543c2702ee68b8038e5601a
SHA1b3efa3bed4424e23af31e4dd6a84383b9826d63f
SHA25691b259f49ebd86ec690d93901f5a66adb528002ed7cd70d8513e35a0184d4846
SHA512e0b7c25132933a184af95a6f05cca70cdf1fb12d606df64d69eb2bbc5ae177c97ee1cf5f34e12e7ae6a5387996f9c4994af9a73b91badbac68ab86916bf7efea