Analysis
-
max time kernel
128s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe
Resource
win7-20240903-en
General
-
Target
8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe
-
Size
12.8MB
-
MD5
dc7493fd5248feebaa4e7c9513351e11
-
SHA1
93b8cb141da976de99dab863ba4c51ce1e190a3b
-
SHA256
8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6
-
SHA512
86b9a20da4e22a624aa695959f77c5d517a89d875eef45c24858c0993e8fce478a373f48e1d497b457e5b9d0ff3453662eea98f1ccb532050aa32cc08dbec522
-
SSDEEP
196608:xRO7XXSRiCaV9TyjXPUcgvUN+MrS4rBKkKiaUJiyi6K/vXt4HbFLd9m+tJVoG3t:qvMrHIY9K/vXK7FLdg+tJ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4304 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe 4304 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe -
resource yara_rule behavioral2/memory/4304-13-0x0000000003410000-0x0000000003434000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4304 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe 4304 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4304 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe 4304 8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe"C:\Users\Admin\AppData\Local\Temp\8eec1cbacaed4637f2f1dac7c09827f4788d4b80d467f7c48d66d5c4cdc744b6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5717ae0841cf17611cefc59ca6cf8284e
SHA135d0dd5cacebb5787a07647f8536aa0294ca680d
SHA2569b89bada8584f038c5c6744ea5249d71a5fa6d953a0152dbad21827a969e047d
SHA5124efd5073d287ecea9cc7eed7d42e9b7e927f33d90faebb348651a35ef36d8ed4fb28e0f7dce77082d264cd0070c5a30393814a44d9760905d9279c2fbe164fde
-
Filesize
449KB
MD5dc78ab716d4c046e187a0ccacceadc57
SHA101da2325701d0f5668bf8acbe28c8a7816f1b5c8
SHA2569eb9405da103fe9c13f8d902fb1d6690d13a9a10115cc8e290ade22fa819af85
SHA5120e02df7741f018d5946f783b4fbe62243847cdd6aed628f86a9c6895ca69db417e4dfce7429d8f9dc591ed9fd9b47ed140deb1f96bd8a7a9937c293f3cc8191c