Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
408972002bfb150e704e4e4442e7e4d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
408972002bfb150e704e4e4442e7e4d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
408972002bfb150e704e4e4442e7e4d0N.exe
-
Size
420KB
-
MD5
408972002bfb150e704e4e4442e7e4d0
-
SHA1
29e016b099d6b8c83113e14c3f4fcf874310d617
-
SHA256
08a9858aea4ab4c61ed1b06110122889d76668f03638818d9eeb68fb39f2d138
-
SHA512
9dfd60fd2f0c3064021b09ca4e5ca14e0be6627e65a0a775e624ce292c28516db2fa927cdf9d194749ba1f395bc44cd67c4a69a664a761f90d07a18004b9289a
-
SSDEEP
12288:e301ufaAbdEM5eJKL7LGdK6GiQDkxvlE:CvEGvDk0
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\s2er333vice9.ini 408972002bfb150e704e4e4442e7e4d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4452 upgraded..exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\Realplayer\MessageBox\upgraded..exe 408972002bfb150e704e4e4442e7e4d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 408972002bfb150e704e4e4442e7e4d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgraded..exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2740 408972002bfb150e704e4e4442e7e4d0N.exe 2740 408972002bfb150e704e4e4442e7e4d0N.exe 2740 408972002bfb150e704e4e4442e7e4d0N.exe 2740 408972002bfb150e704e4e4442e7e4d0N.exe 4452 upgraded..exe 4452 upgraded..exe 4452 upgraded..exe 4452 upgraded..exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4452 2740 408972002bfb150e704e4e4442e7e4d0N.exe 85 PID 2740 wrote to memory of 4452 2740 408972002bfb150e704e4e4442e7e4d0N.exe 85 PID 2740 wrote to memory of 4452 2740 408972002bfb150e704e4e4442e7e4d0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\408972002bfb150e704e4e4442e7e4d0N.exe"C:\Users\Admin\AppData\Local\Temp\408972002bfb150e704e4e4442e7e4d0N.exe"1⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\program files\Realplayer\MessageBox\upgraded..exe"c:\program files\Realplayer\MessageBox\upgraded..exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD5773094c43200cb13ee3aae9bb47ec803
SHA1320c5d30088854ca0a8fdc01bb908af9c8829917
SHA256f3d5b9a55bb45563cdbc6f6343bd491958fc6f698c290cc4e6e163b39d1ee839
SHA512799b2806c2b97689845e6c27a8c1fea532a0309b000c55ee5d04ca1892b8d1d198db4a063b7aee0d03232de0115937bd859014ae6af90a83db11d4047561ff43