Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe
Resource
win10v2004-20240802-en
General
-
Target
28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe
-
Size
42.2MB
-
MD5
5e4c0c11b8e670db2474e982ab99653b
-
SHA1
5422faddb2928239af2958507032487ac9f502e3
-
SHA256
28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619
-
SHA512
8acae7578565b18b5db4a675d52cc8bf3e3aa8eb8e47d840ff985de9f8453c724fa7508ded15c3eebc52688d2edd01f5e19515c4335957d3e3b1656e2fb83efb
-
SSDEEP
393216:bgMecMfMCe0RzQQQmFCQvu3GF8RSRMAF79jglOCyh5X:bgMecWC7kGOC8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1796 PrnInstall.exe -
Loads dropped DLL 1 IoCs
pid Process 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrnInstall.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 1796 PrnInstall.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31 PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31 PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31 PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31 PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31 PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31 PID 2460 wrote to memory of 1796 2460 28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe"C:\Users\Admin\AppData\Local\Temp\28d181a9703684171aa42d58db5931e2ef130a4c0e2c500412a40b8570d84619.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Pharos\PrnInstall.exe"C:\Users\Admin\AppData\Local\Temp\Pharos\PrnInstall.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5782385bfd47ee8138ef1157f29fb9cb1
SHA1e0e958b4699fdd45ed718c4161024a0923d5b557
SHA2568b3cad7d9f4c2fefbffcd8679bd909633129d98ea211dc60776c539294e3e791
SHA5121943ebd39a8b11c3c99a15e017949226b51d61f7e23c0aca2862901f5c4e9c0fa8436d271fa4eaab2e72f25b2c2046ba583fb807f0bd78a0569911943e6ab189
-
Filesize
1.8MB
MD5c220f71b7d7e581aed9561d355d7a2f5
SHA10a19606b2896ebc8ab44a7703351c1e08c0bb24e
SHA2569320848858dbea269d2d8f5a30eb0b623677a95ae32122ebc641d20af34b12ed
SHA512c8ee050e0274f1f568c7c7b111817671e3635e553a4c2219118ffb0a6e595bd10ad61b06455125eae42233f4e18669449dabc64e943ed40936a28e725e747479