Analysis
-
max time kernel
127s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
ishredder-windows.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ishredder-windows.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
(x32bit.)_v7.0.21.01.09_patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
(x32bit.)_v7.0.21.01.09_patch.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
(x64bit.)_v7.0.21.01.09_patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
(x64bit.)_v7.0.21.01.09_patch.exe
Resource
win10v2004-20240802-en
General
-
Target
(x64bit.)_v7.0.21.01.09_patch.exe
-
Size
853KB
-
MD5
61c6de9ef2d61f6d77de86f9b3d6f848
-
SHA1
a1e434c61d797122cbb345b28ccbc90d2a0a76df
-
SHA256
ba5fc4658d6a7f57f9794725aff0d09489680fe3b9c818d682dab6a8eb795606
-
SHA512
fd6240a863462af7dfcdd6f0c5e8001762427aa88c9e3a89b0ca6b16b6a4c16885dba1334b15f4c0ce9b8122c28b301eb3ec4d8ea41872c685845a4b2c9e5801
-
SSDEEP
24576:Bv+nMxZlyVc/Is38RGI5hrAZr0i0pcnggWlV:pjnlQcws36Gr14V
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3764 (x64bit.)_v7.0.21.01.09_patch.exe 3764 (x64bit.)_v7.0.21.01.09_patch.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language (x64bit.)_v7.0.21.01.09_patch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1036 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\(x64bit.)_v7.0.21.01.09_patch.exe"C:\Users\Admin\AppData\Local\Temp\(x64bit.)_v7.0.21.01.09_patch.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3764
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4048,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4460 /prefetch:81⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5780d14604d49e3c634200c523def8351
SHA1e208ef6f421d2260070a9222f1f918f1de0a8eeb
SHA256844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2
SHA512a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b
-
Filesize
839KB
MD5f37a6ecb58bf46d219836fa190eff225
SHA191b1f8e1db1028e6bf561b895d4fda794dc4defc
SHA256c73bfb202e8f6eb847a211596ffaee38c950b786f5b08a21c456bea1865c53a4
SHA512eb9fd4dadf52f46c83fc7835d3388be04dabdbb247b20a8ca55c8d0b8ccd2b39459e0e608a534df9888074542a5bad308aace8cb8f4d6c27ef4e31b70ba9f324