Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
f10d69fa01ab280282ac6fa616c85b50N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f10d69fa01ab280282ac6fa616c85b50N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240802-en
General
-
Target
f10d69fa01ab280282ac6fa616c85b50N.exe
-
Size
42KB
-
MD5
f10d69fa01ab280282ac6fa616c85b50
-
SHA1
c7b08a761cd08c9093299c0fce16b0c23f36edda
-
SHA256
cba1298f8429df00aa918596deaacb0e4d584c58ed52993cc3bd2cde1d2f0485
-
SHA512
c785b5d874b1280ea5923f105931c5ac5e5e40dfa4558ba5cededb363145ae8dc9d62351d99f86a021d7de63c44ce4dd3cfaa7454f932be445858fba159c48bc
-
SSDEEP
768:KHJd0TpH2+bQ2dUWVX9Hfv1JMWmtLEJOyuBxG0D3mjfS3XJbCOFVkqIzq2ba0LaX:KpgpHzb9dZVX9fHMvG0D3XJbCO3kqIz6
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3020 f10d69fa01ab280282ac6fa616c85b50N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f10d69fa01ab280282ac6fa616c85b50N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977