Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 10:14

General

  • Target

    $TEMP/googletoolbarinstaller_stub_signed.exe

  • Size

    196KB

  • MD5

    bc67002cc524050eafdf18204c22c538

  • SHA1

    9fdddaa5fbe1eeaec2b34938f0aff33766224453

  • SHA256

    b31b4fffddc25735f8429a56d166c15187682a6010797e9a707534d09e4fc8fc

  • SHA512

    c6d5fd4cc0d8ccff2288c721dfbc0ef35d946fa2790306fb189d0a40da0b38bda095e105c6ad95a7040780c367f300b0571a7e8072b9d83617416125f5ec8b27

  • SSDEEP

    3072:naiSFHQ392Jk3jNxvMFc7KhXrpVCjPWSZh1+gKWN8XlaM6neWIY4Fif5T5jH5C:na1FHQ9bNKhpVCSEh1RdGqeWIY4Aff5C

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\googletoolbarinstaller_stub_signed.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\googletoolbarinstaller_stub_signed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Google Toolbar\gtm7B3B.tmp

    Filesize

    19KB

    MD5

    79942dac42e18c0003f796f017f5ed3b

    SHA1

    9240975094213e86feb006b518d666648eeaac59

    SHA256

    b01ad14194f6dca0fb204b68a1e8123584d8c1722cde390803e97cf5b11094e5

    SHA512

    fa96d06dbb5cf55a8e527df03ec7cd59417f4de8e64f4ea6ec762bbce1d94d54b9c4729a0b32ae057385613dcf9af301b8a93009e76a3245a60799ebe40b9cee

  • memory/3680-0-0x00000000003F0000-0x0000000000470000-memory.dmp

    Filesize

    512KB

  • memory/3680-1-0x00000000012C0000-0x00000000012C2000-memory.dmp

    Filesize

    8KB

  • memory/3680-2-0x0000000001420000-0x0000000001421000-memory.dmp

    Filesize

    4KB

  • memory/3680-22-0x00000000003F0000-0x0000000000470000-memory.dmp

    Filesize

    512KB