Analysis

  • max time kernel
    145s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 11:17

General

  • Target

    Gmod_Updater.exe

  • Size

    2.2MB

  • MD5

    50e570aa28fa78f1c3029d4db50e1099

  • SHA1

    fdee7d28208179e1f859db4f4bc97f96df2b7b6a

  • SHA256

    dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf

  • SHA512

    a7858a9372f5c2500da1faeff536945833e29ca96343e1c46904f210cdb04885931226e3dfbd13e218447f2522a5b81a499ec4dd3cb5fc899fe9e18e742c7904

  • SSDEEP

    49152:1kUQIF2Aa7TAaVnGHP0q7x5o0WnfnL9t:1kUj5aVnSsU/0nL9t

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.exe
    "C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.new.exe
      "C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.new.exe" /update "C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.exe
        "C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.exe" /delete "C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.new.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Gmod_Updater.new.exe

          Filesize

          2.2MB

          MD5

          50e570aa28fa78f1c3029d4db50e1099

          SHA1

          fdee7d28208179e1f859db4f4bc97f96df2b7b6a

          SHA256

          dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf

          SHA512

          a7858a9372f5c2500da1faeff536945833e29ca96343e1c46904f210cdb04885931226e3dfbd13e218447f2522a5b81a499ec4dd3cb5fc899fe9e18e742c7904

        • memory/2636-0-0x0000000000960000-0x0000000000961000-memory.dmp

          Filesize

          4KB

        • memory/2636-1-0x00000000029F0000-0x00000000029F1000-memory.dmp

          Filesize

          4KB

        • memory/2636-8-0x0000000000400000-0x0000000000641000-memory.dmp

          Filesize

          2.3MB

        • memory/3116-7-0x0000000000830000-0x0000000000831000-memory.dmp

          Filesize

          4KB

        • memory/3116-12-0x0000000000400000-0x0000000000641000-memory.dmp

          Filesize

          2.3MB

        • memory/3332-13-0x0000000002440000-0x0000000002441000-memory.dmp

          Filesize

          4KB

        • memory/3332-15-0x0000000002470000-0x0000000002471000-memory.dmp

          Filesize

          4KB

        • memory/3332-25-0x0000000002440000-0x0000000002441000-memory.dmp

          Filesize

          4KB

        • memory/3332-26-0x0000000000400000-0x0000000000641000-memory.dmp

          Filesize

          2.3MB