Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 03:38

General

  • Target

    4b4267806c13daa2299e2f53d3758af0N.exe

  • Size

    9.6MB

  • MD5

    4b4267806c13daa2299e2f53d3758af0

  • SHA1

    a4ff8e1151507498c739b610630df1492863173c

  • SHA256

    e1c0734cc667ac700ba1e95da2185caa19d002b775507638208ba1dc4a7f5f99

  • SHA512

    f49e46d13ad0a753e5667b302dbcbda3e6d98e0d4e5c76e84016df5bf442d7f18f6346570f5b1a9a09049aa2686a3c52c2eefd7ad610d3ea4cca0116c1923ccd

  • SSDEEP

    196608:I3qnhgJuP3LAhCiVXOWv06A1oMuWr45hrr2s:nS+LJ9eJWGhrr2s

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 44 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b4267806c13daa2299e2f53d3758af0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b4267806c13daa2299e2f53d3758af0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\AcrobatAdobe19.10.20064.310990.exe

    Filesize

    9.6MB

    MD5

    873d0b5679896937ec707e198a08f305

    SHA1

    a7e93a0ee332b3958f32fd529cfeaac1bb57a908

    SHA256

    5e942ff3bd1a0cbe34b1016ffe266c432df22c8065f6f3e1bd18183400dc0719

    SHA512

    b1cbbced2849cd9b6462995ca1345625203330272ff0fc4af96b974065e1eebe65edf34e99fcf849b6c1e0550c2ff7a3317cfb9e28957526c1632d8889cb212b

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogSessionUnicode.exe

    Filesize

    10.2MB

    MD5

    da0e0d38097110993140d96c6a6cfc83

    SHA1

    52a5300bfb956875cf74b4ab4b494b74ecf4c6c0

    SHA256

    fd05e983b63f622952695fbca61773f5f2fbb7417e332a6816ed9c6ee21645a0

    SHA512

    a320bf6aa63c1d04e816e157e12f14b7646b3a8f3e6474677523df93740150d7bbd48b110fc38071fb42b48117bfeb6b7d125c60efe17242cb69bc49794b2595

  • C:\Program Files (x86)\Common Files\System\de-DE\RCX97EF.tmp

    Filesize

    9.6MB

    MD5

    ed677aa5c26a840d663ef17e89a39dd7

    SHA1

    46fe54054d24da488b3d9c191b3e930e7fb9e590

    SHA256

    a256b8426082df3039422fbaf2560ca6dd9c862d855ed92b47d6fa9c917f9bc8

    SHA512

    5d18e57eef541e9b7d125ffcada6396f1becc4dba714e9151deffbf3db4f25ead96515a14bf2b8dec365260082ba49f13f130b6ed55bf7c604252e180e48e47b

  • C:\Program Files (x86)\Mozilla Maintenance Service\Firefoxmaintenanceserviceinstaller.exe

    Filesize

    9.6MB

    MD5

    5df379471a4273bf987657716684b6d2

    SHA1

    1009cb13f16dbb8d173094321203aee54065c6af

    SHA256

    290320cbb69c927cd09cd86b918f6dba687de86056bbf64a77164923abb1f504

    SHA512

    5e8d43e59801bf48eb1e5e6ea795e8f6380ebf35ccf26f3126a5d8d7538d363a07179e98e6c22e4a1bfda2eb6c4a7c18abfb17e03265415f66c6bab1dbca3adf

  • C:\Program Files (x86)\Windows Media Player\uk-UA\WindowsWindows.exe

    Filesize

    9.6MB

    MD5

    4b4267806c13daa2299e2f53d3758af0

    SHA1

    a4ff8e1151507498c739b610630df1492863173c

    SHA256

    e1c0734cc667ac700ba1e95da2185caa19d002b775507638208ba1dc4a7f5f99

    SHA512

    f49e46d13ad0a753e5667b302dbcbda3e6d98e0d4e5c76e84016df5bf442d7f18f6346570f5b1a9a09049aa2686a3c52c2eefd7ad610d3ea4cca0116c1923ccd