Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 22:11

General

  • Target

    c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.exe

  • Size

    2.4MB

  • MD5

    19ed63fd4ad42c31550f0c8a62945c86

  • SHA1

    09dacf77ecbe2ec3035fbf726bdb41b55173e93c

  • SHA256

    c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce

  • SHA512

    bd8ed9f637e30f80756dd180e863ad97278bcb1f864803321e7d2eb79dfede1e65153dde8e442ac13ab56249692ca3ac2d1c054e05d234a143f349e4d02fba1e

  • SSDEEP

    24576:x2Jyxd4VR7of2SI8LUlFl5FpW2Jyxt4VR7of2SI8LUlFl5FpQt:Akny5smcY/pk3y5smcY/6

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.tmp
      C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.tmp
      2⤵
      • Executes dropped EXE
      PID:3664
    • C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.mm
      C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.mm /zhj
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Windows\GOG.exe
        C:\Windows\GOG.exe /zhj
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:2244
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3724,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:8
    1⤵
      PID:3944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.mm

      Filesize

      2.3MB

      MD5

      fa1c2f29469a12ae4a87ab9014a21059

      SHA1

      ba597b5af90106a5794378a67df35b5c829d5ae8

      SHA256

      db0ee4f4aaee1feb8bbe7bf27fda8660b0ef818da47440ef85e930ec58326f66

      SHA512

      0a51b779495d81c877d43e535da5f46f38f08bb2425ec02a30ac49da8d62d0ecfde10225cf2bc794a350218ee5263ab2f5d9f28c913c919504f0260429cb69b7

    • C:\Users\Admin\AppData\Local\Temp\c0d2748c32c4160171dd31014d688dfa8ce325df72b6b12f58b14bf8f8416fce.tmp

      Filesize

      23KB

      MD5

      8e9ab961e3f490a0f8e4eb4a7a53ac7c

      SHA1

      a751fe3b595d7c8e0fd5d7203c02274a471a89bd

      SHA256

      d10da3a4b904c690a70f5e6184d6c935b9ae781f81762cb8028dc71580cb9bee

      SHA512

      c0787718f3cc09aec220ef7a94cc0a3e78d8e90f892d74108989ccc648edfbf9b6df7ca5a56805508e6555161458e86d6284691fc77074c12cb81f31212d66f6

    • memory/928-0-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/928-66-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2244-67-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/3664-14-0x00007FF7C8BB0000-0x00007FF7C8BB8000-memory.dmp

      Filesize

      32KB

    • memory/4284-15-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB