Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe
Resource
win10v2004-20240802-en
General
-
Target
7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe
-
Size
6.1MB
-
MD5
bc1ee090d42ad676058d90aeee9fb195
-
SHA1
1bbc1de7888b935682e8d52b2ae7eb455141d785
-
SHA256
7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404
-
SHA512
269c1c90fbf62554031ad5acecd222d342a97eb801b23175889c9e039458aef401582f0c88f008c417a0c1612ab581b21963e72597186c46097073b0c8239caf
-
SSDEEP
98304:YCmewJcqScBVteYwMJgJbfmnhX7bv8OiVMFzoNQ7yB12t+NIxncaecHkPIHl:YCd7qdwJ1EbE1MFMB13NIxnp5kQF
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe 2860 7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe"C:\Users\Admin\AppData\Local\Temp\7ce203e7a333e4c8a1aa265918b5e9bdf1c7fa809c9d022de44ef0d96c4ef404.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
Filesize
38KB
MD5c384903705d9c568f9cb242017848669
SHA1524553e05d6b30b6406e0515ab3a25287da15b94
SHA256653d01432f27a0a4c356529bfa6df2f54adaf9a90f82cf7a2599ef57062a3f69
SHA5121abc1ca1479943160653157a8173a5370e1c20f8569b6cb6387d31476157c493911d49ff3c7e7b5be6dec32c121d7f5a808de5686d90e6775e61b293f89dc96f