Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe
Resource
win7-20240903-en
General
-
Target
988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe
-
Size
14.6MB
-
MD5
236769e98c4bbaf53ed5c03e4e8d208a
-
SHA1
2fed4b37c15fbd16bde59442dce8ea0563f72519
-
SHA256
988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4
-
SHA512
b1d22ec2d3731ed46ce1ddaa76d3415bd543d067e0c99921505b5630e57a84be278f4212d4357f03a1e60fe512499c1a473691f29b36b973d6e9cf945b8cc1df
-
SSDEEP
393216:jLEJrQ9iYhgPia3yubZ1dwzYQPdhlmgATFuz72Up/Twa9M5:jIJrQ9hgPV3XbHidFhlmgA8z72Up0am
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2652 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe -
resource yara_rule behavioral1/memory/2652-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2652-48-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2652 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2652 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe 2652 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe 2652 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe 2652 988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe"C:\Users\Admin\AppData\Local\Temp\988d782ce7177699402fe7e6f6c8b742cb1e9d8ce697393d7c65e62070c24cd4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a