Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 22:23
Behavioral task
behavioral1
Sample
gtaivp10trn/403__gtaivp10trn/gtaiv_p10_trn.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
gtaivp10trn/403__gtaivp10trn/gtaiv_p10_trn.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
gtaivp10trn/Всё для GTA4.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
gtaivp10trn/Всё для GTA4.url
Resource
win10v2004-20240802-en
General
-
Target
gtaivp10trn/403__gtaivp10trn/gtaiv_p10_trn.exe
-
Size
91KB
-
MD5
10102699a4fff6ad8dd36b9b3f633499
-
SHA1
e5cede4c70427755cf7ff9c4d1f4dd9323320695
-
SHA256
b428a95005cf7455484f5c445c59692c5f5c38909e3a9b734130501bdfa71bcc
-
SHA512
14bf0e74fbaa6e8e78962bf1119ce1d858b269619866fb1f7ac66c99190b8a9398085e2576e7927dae43d096ac7bc1aff79759544f1394f5f8d2bd44d1c9fe77
-
SSDEEP
1536:WIyjbAj5ekbYz1LR8e6V5vwy4sRt0yj09cE+dT/UxLQ/lyjVoi:WIEbA2keSvww0yj0y/R/D9cH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2804-0-0x0000000000400000-0x0000000000440FFA-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtaiv_p10_trn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe 2804 gtaiv_p10_trn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 gtaiv_p10_trn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gtaivp10trn\403__gtaivp10trn\gtaiv_p10_trn.exe"C:\Users\Admin\AppData\Local\Temp\gtaivp10trn\403__gtaivp10trn\gtaiv_p10_trn.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2804