Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
5437f0cc081aa1f8e1384b92d49223f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5437f0cc081aa1f8e1384b92d49223f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5437f0cc081aa1f8e1384b92d49223f0N.exe
-
Size
688KB
-
MD5
5437f0cc081aa1f8e1384b92d49223f0
-
SHA1
619b97bd1d0608ecedf71c672fe6ff26b4e4989b
-
SHA256
0f678f0dac56a359ffbe9a3933897b175a69829ff3932d68cad5a66eb2304724
-
SHA512
75b5f6004bcc52dd4453b1c3cdcfdb2954ed97782bae9819808f61d7a91655b72940c18c7f74b81eeaa32d655d089198ce0ae6e5d89f145be908fd5547123c64
-
SSDEEP
12288:YJk+lB5n+QqapCIOI9/aOB/31f6WfhWhOsgtX9jD3a:+lzBLpCLI9yOdFBGOsgZx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Hxlibrary = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5437f0cc081aa1f8e1384b92d49223f0N.exe" 5437f0cc081aa1f8e1384b92d49223f0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ts.ini 5437f0cc081aa1f8e1384b92d49223f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5437f0cc081aa1f8e1384b92d49223f0N.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1448 5437f0cc081aa1f8e1384b92d49223f0N.exe 1448 5437f0cc081aa1f8e1384b92d49223f0N.exe 1448 5437f0cc081aa1f8e1384b92d49223f0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1448 5437f0cc081aa1f8e1384b92d49223f0N.exe 1448 5437f0cc081aa1f8e1384b92d49223f0N.exe 1448 5437f0cc081aa1f8e1384b92d49223f0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5437f0cc081aa1f8e1384b92d49223f0N.exe"C:\Users\Admin\AppData\Local\Temp\5437f0cc081aa1f8e1384b92d49223f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1448