Overview
overview
7Static
static
352e2e14aad...0N.exe
windows7-x64
752e2e14aad...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
37za.exe
windows7-x64
37za.exe
windows10-2004-x64
3Analysis
-
max time kernel
111s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
52e2e14aad4d70872bcc1e124d1631f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52e2e14aad4d70872bcc1e124d1631f0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
7za.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7za.exe
Resource
win10v2004-20240802-en
General
-
Target
52e2e14aad4d70872bcc1e124d1631f0N.exe
-
Size
292KB
-
MD5
52e2e14aad4d70872bcc1e124d1631f0
-
SHA1
d1530d0241bcdeeb50c9f02d619882fa0bb7e41a
-
SHA256
3af560d472c2148e91c502b48ab368ca615919236381e9cb390c91bbf631467b
-
SHA512
e5394a10452f83643ede4444709bd82cf4b8bac6b284eeb169c8fefbf1eabab5c2e0f6af3e25fc1770a8b0844e3b256ee5cd16235767be072ab7909a050326e2
-
SSDEEP
6144:wQ3IanM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2j:CanM3D0Fw/tN8dkmLtpHHHrh7w
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2564 52e2e14aad4d70872bcc1e124d1631f0N.exe 2564 52e2e14aad4d70872bcc1e124d1631f0N.exe 2564 52e2e14aad4d70872bcc1e124d1631f0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52e2e14aad4d70872bcc1e124d1631f0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD57fbda5b7be6256996d4e59e5f6949918
SHA12d36c0e0bfbe450675c6ed044e715abaa85a252a
SHA2569bb31f7f02231e3166bf52385d804c06da9740e9c6f0bda807b01052ae9fdcd4
SHA512bc0d36aa6f50041bad05cf48d909ed5a387bff5b111f657591161a288c1be5c20b8c5d69e557b5ea395726d91601b9e6303da81555e053090cfcbf5d44be7f82
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c