Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe
Resource
win10v2004-20240802-en
General
-
Target
130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe
-
Size
52KB
-
MD5
40446a8ab3363b839e9ae5657b291f90
-
SHA1
0c55a111cad0189fa986b5026921981747c7818f
-
SHA256
130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0fe
-
SHA512
9784d9c938c510b72f1a247d0963c2009e7910763fe95e60ff0c4d2a3bfd9b4275fcf584606c4b78b9da794d1e7db5350ce5c0316f495c51c0ced031f14e1e6b
-
SSDEEP
768:NXZmm1UTOEdB7v8W2PSO8u69jytwLJQtOwI7Tc11paHaA/C3:NpjUNkCuaetw6tjUTZ3/C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 svrwsc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe 130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe"C:\Users\Admin\AppData\Local\Temp\130252a9f1df2c0095c529a2ecba24034bc98dc2cf944ed0c46c8bdb83e9c0feN.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:212
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD55028aadc91c9eb8557a40c1743799793
SHA175349aaafe07b202c60eac716a093504cc6d24e2
SHA256b91696e8233e6433b860aaad1e083dfafcbaef8d1fb8655e5e7ffe123271466d
SHA5122c31d2c483ece0de02576c67e75e88bcd67a50688cdc5203214465c356a70bdcbb0ec03aef4b7bcd9bf8153e1f3cb94ff826e55651c77f0ccb1faf5997c2c2fd