Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 11:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
IMG2110EJPG.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
IMG2110EJPG.exe
-
Size
180KB
-
MD5
91575475845a413145f40a52aa0dbdbe
-
SHA1
77ede321de2e4b5c8ed35b6021761e6a28d7c4ae
-
SHA256
31ff1c7b6a573ad6c9294d272f84a4a7c8b4f1fa0029fdaba9c40a854294fc46
-
SHA512
69915cbed1a8a6892992a5f977ab0b01aae6e41ec21be5c1146f680612bdd3a6c6c06f4e5ced548c8b59c0087cf83f23f2df111b0f9451f1e2e86c5c1dc85bac
-
SSDEEP
3072:pD+8YTx96HM0XU+aDe5UEjmIlmijI7rUGimMNw7qU5lTYpMoYrrrrKFfA4MEzWrY:F+tRn+aC1meyUGimMNhpMohW4JzW4x
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG2110EJPG.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" IMG2110EJPG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key IMG2110EJPG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ IMG2110EJPG.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2900 reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4576 IMG2110EJPG.exe 4576 IMG2110EJPG.exe 4576 IMG2110EJPG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4576 wrote to memory of 1228 4576 IMG2110EJPG.exe 84 PID 4576 wrote to memory of 1228 4576 IMG2110EJPG.exe 84 PID 4576 wrote to memory of 1228 4576 IMG2110EJPG.exe 84 PID 1228 wrote to memory of 2900 1228 cmd.exe 86 PID 1228 wrote to memory of 2900 1228 cmd.exe 86 PID 1228 wrote to memory of 2900 1228 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG2110EJPG.exe"C:\Users\Admin\AppData\Local\Temp\IMG2110EJPG.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2900
-
-