Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe
Resource
win10v2004-20240910-en
General
-
Target
46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe
-
Size
4.4MB
-
MD5
5fbfb99af6f7c42cbadb351d0e6b02bf
-
SHA1
db1f4c18b791e91d280ba7344eddebe8372ef7cb
-
SHA256
46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06
-
SHA512
f96916b8babd8b75a8fb95bd0a33e8e30f29d78a13078702975cd10f5b9934080c868ea770b04845c89e7e962ff606908dcbed4763a3ac1dc71cba812a02acac
-
SSDEEP
98304:mHnw52DWlnEENKe8n7dArHbBZGp92U+l2yGV5a5Ryteb6xNkkIgUtSw3SLyud:mHi2DWREcbbBMp9GU53E6xNkklUUSSL
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe File opened (read-only) \??\e: 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2920 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe 2920 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe 2920 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe 2920 46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe"C:\Users\Admin\AppData\Local\Temp\46e02fb2a81b2a01c0bbc457fce411940be76382168765c4b036d55e39b80b06.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2920