Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:40

General

  • Target

    2ad13a954470be70ef212b64de1d4b0bb09c2d2b5af22e6792ed55d01df5788dN.exe

  • Size

    9.6MB

  • MD5

    c0564b68734ba347816a60f257f65a00

  • SHA1

    77b8bd5f2099defce01cbe1658aedc85aa5f896e

  • SHA256

    2ad13a954470be70ef212b64de1d4b0bb09c2d2b5af22e6792ed55d01df5788d

  • SHA512

    7335c5a1abdfd4284d1aaf8ec4cdee130e221d1cb3ee3ea01cf45b0336277c6e3c0f458a3f3ae0f99a554650b33562940508573c85613a185f1ce0a77009c266

  • SSDEEP

    196608:V7qnhgJuP3LAhCiVX5WvrOA1oMuWr45hrr2S:uS+Le+eJWGhrr2S

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ad13a954470be70ef212b64de1d4b0bb09c2d2b5af22e6792ed55d01df5788dN.exe
    "C:\Users\Admin\AppData\Local\Temp\2ad13a954470be70ef212b64de1d4b0bb09c2d2b5af22e6792ed55d01df5788dN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\LinkDirectX.exe

    Filesize

    9.6MB

    MD5

    82ba5abd40101926379116dcedbb1003

    SHA1

    73804651c8e4520df8ebf5bdae8871c798db9fa3

    SHA256

    da62755b25b1643b8f9f055119967dd77d40c3a47b47f7db2d686034be10ed45

    SHA512

    495e3665b8dfe6c57114c820c0e3e9e978706a027c8159658825cdbf87423315927bdf31db09be6f387b14e3359ef4aef0d39d518ab795d5c2bbea6b992d8a8d

  • C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\ApplicationsStudio.exe

    Filesize

    9.6MB

    MD5

    c0564b68734ba347816a60f257f65a00

    SHA1

    77b8bd5f2099defce01cbe1658aedc85aa5f896e

    SHA256

    2ad13a954470be70ef212b64de1d4b0bb09c2d2b5af22e6792ed55d01df5788d

    SHA512

    7335c5a1abdfd4284d1aaf8ec4cdee130e221d1cb3ee3ea01cf45b0336277c6e3c0f458a3f3ae0f99a554650b33562940508573c85613a185f1ce0a77009c266

  • C:\Program Files (x86)\Common Files\System\Ole DB\es-ES\RCX767A.tmp

    Filesize

    9.7MB

    MD5

    a9d5009d0637fa218655b1f2f06a0650

    SHA1

    9f1faca0d2b5e0868539f5893de46cbdc306a81e

    SHA256

    8269f7d0b08582ccbebd59f7b397a6f2f4cf55ddc71155268b4627637ace0993

    SHA512

    d84450c38c180f5c936daf752372bbbca4645e65b34da5c7c2944b2c976286defeeac3f6a4744c31aafc8c910bda05799dc28843564526b7115b9f3b815ae931

  • C:\Windows\assembly\GAC_MSIL\System.ComponentModel.DataAnnotations.Resources\3.5.0.0_it_31bf3856ad364e35\resourcesFramework.exe

    Filesize

    9.7MB

    MD5

    3407edc97d3a31e203ddc4689963c3e8

    SHA1

    702e7d0d88d1196036371e03fd9e645090e4566d

    SHA256

    9cb7d58cc306fec2620675a5917e77dabcc646371fcc780e2f3676e4fe4090f0

    SHA512

    3da6a7e6cb52d405fa280731ca12f50c2631fc2ec2442970bf77d6beaaf160e53b1251fa190e2b5629e73f2e63d54dc43e7f10379ff2e05494a7e515f7b20e80