Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:42

General

  • Target

    1e05962fe6a8dd015a0abd46e896fe9b86f6d7ae68eca0412cf033b4d539e734N.exe

  • Size

    9.9MB

  • MD5

    8b333d82d155fa98d1673371a7518a90

  • SHA1

    f8fbf6b8cfa81226badd460b5758a974b63719dd

  • SHA256

    1e05962fe6a8dd015a0abd46e896fe9b86f6d7ae68eca0412cf033b4d539e734

  • SHA512

    1a6c4dccad3852feed08cb7eaf10149889e2619450a0873e8e33b0e26134fd993bd10ec736d3496a62ebd420767273690a4443c721e1a2d0bc58154fe175acad

  • SSDEEP

    196608:7HqnhgJuP3LAhCiVXCWeZLsA1oMuWr45hrr2P:US+LVReJWGhrr2P

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e05962fe6a8dd015a0abd46e896fe9b86f6d7ae68eca0412cf033b4d539e734N.exe
    "C:\Users\Admin\AppData\Local\Temp\1e05962fe6a8dd015a0abd46e896fe9b86f6d7ae68eca0412cf033b4d539e734N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\libGLESv2DirectX.exe

    Filesize

    9.9MB

    MD5

    68aba3c21778d167ef7e07f61a3bd6b9

    SHA1

    d9a3bcb4c6fd18f732bcd22acad3679f7c017b7d

    SHA256

    7951a84d1ffe4921aeaee5f1a69dfdbcc695931a280ce079d79891b2a48ef187

    SHA512

    e31fc75e05b4e38c3faabf3ad676d27d9051aaa16b6b7ee701e23d8cd84e55d49614ffc85e525f1fe67e5f92354e936f413ad75c6036e19b03242bc36c5cc9e6

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\AdobeCreate.exe

    Filesize

    10.0MB

    MD5

    74beae54b75d0dfb8f884d2c5f745820

    SHA1

    2b693829092bf49eca3a1495a56788df83598c3a

    SHA256

    e6e460ce1a0f8a2817e3991b4d5f1a12514feae5eb4866e89669902057ece410

    SHA512

    737ade4262b15fdd1ed28a87a76ad1366954adcf8669b3e4d96a4218c811ab4491bcf80ef355d378122fc1c1be1134d2d1f26147cd59172db79a5d8038288ed7

  • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\ReaderAdobeARM.exe

    Filesize

    10.3MB

    MD5

    02c1213606231e4c2b11ee4bbe456e14

    SHA1

    72f8a3a196dbca244b51f225014fdd847eb839eb

    SHA256

    36318dffde8bd748fe8e6c991a2e6a8724a0c32f66d8c705b1685f4d4935e1e5

    SHA512

    a1791e531fef6b4ec73fb36c206923c209ba807c998fab8e240534870bdd61ee01b94ce17d2d51e8bff1dd937ce117b0492ce242759b1946a7baca8758a1bc97

  • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\RCXA156.tmp

    Filesize

    9.9MB

    MD5

    79728cc63ec3adfeed801a9bf5a087f2

    SHA1

    585066e3cfc7aaec68995e3d7e8024327d8f7a9d

    SHA256

    034ff046dbe6af36b91bb5ecfdce8dd8e3c4e96e03097ba8fad2f16d41be5a0d

    SHA512

    8c7a1153de20cce5d6b5468853b88dda2c69b5b7c06dd95e23eeb39a6e5d1e91ab0cda4880ba05afde1684e756c61fd169e671ac09d72d6cb4824be8aa4d20bc

  • C:\Program Files (x86)\Common Files\System\ado\de-DE\RCX9F8F.tmp

    Filesize

    9.9MB

    MD5

    86c2cba4ca42640bf96ee575b7ecb619

    SHA1

    e9fc9b21c04e93c3ff0beeb1411b748b8a480cc0

    SHA256

    bf0520087204728677c007de9bc1c85e5049e7349a85b373f4e309a4fc146317

    SHA512

    cfe8170e2a20adb69ad56e9dd38bbeff845df47598861f66431406c22b95c62cb643d41ffc022aa680fc2da7ec1161a3b63b65c72b04a403b0b1b11b1764d520

  • C:\Program Files (x86)\Common Files\System\msadc\de-DE\msdaremrmsadcer10.0.19041.1.160101.0800.exe

    Filesize

    9.9MB

    MD5

    8b333d82d155fa98d1673371a7518a90

    SHA1

    f8fbf6b8cfa81226badd460b5758a974b63719dd

    SHA256

    1e05962fe6a8dd015a0abd46e896fe9b86f6d7ae68eca0412cf033b4d539e734

    SHA512

    1a6c4dccad3852feed08cb7eaf10149889e2619450a0873e8e33b0e26134fd993bd10ec736d3496a62ebd420767273690a4443c721e1a2d0bc58154fe175acad

  • C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.W708fc392#\e0d84dc25c6b76503171beec9d740dde\WriteDiagProgressWindows.exe

    Filesize

    9.9MB

    MD5

    63bace3a41ad43581ed10f63018a04eb

    SHA1

    e12800eac2b41e894512c848aada36cd69b0eed3

    SHA256

    d9ca39f53ae3bec3760f81369dd85aec2b9eef5a95aac83a65daf90aa008f77b

    SHA512

    7b0c7f5fa51d233c06b6a915c74b22438c5557f89e1b5fe4970f0a69e854a6382073513a47e28414b558d02e5b8d30553786bbe0dc6123f17c1ef487171d121a