Overview
overview
7Static
static
39637503226...5N.exe
windows7-x64
79637503226...5N.exe
windows10-2004-x64
7$0/Resourc...d.html
windows7-x64
3$0/Resourc...d.html
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...r.html
windows7-x64
3$PLUGINSDI...r.html
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PROGRAMFI...gs.exe
windows7-x64
3$PROGRAMFI...gs.exe
windows10-2004-x64
3$PROGRAMFI...ot.dll
windows7-x64
3$PROGRAMFI...ot.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$0/Resources/BrowserSearch/alot_search_defend.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/eula_fr.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/eula_fr.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/installhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/installhelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/alot/bin/ALOTSettings.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/alot/bin/alot.dll
Resource
win10v2004-20240802-en
General
-
Target
9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe
-
Size
691KB
-
MD5
f47b2a370c0ba8d26c2503c80b1d21d0
-
SHA1
ead66fbb5314d5bb4cb8735f14cc1494d895b2a0
-
SHA256
9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865
-
SHA512
f3ae49c30eb1323b067ddf6590fe2e6eca52864898bbd2ec2a3778185d8ad93dae32e210a8294ce5247355ddaf8047d8b11acb9dcbdf7cfbfe5e256115889b57
-
SSDEEP
12288:AmJehr12dOApfdNhHXPRPNwH6zZ51wBL4ydquTHYU3FkbYeAirGAKQIB65JHZR6L:AmJ22QglNhfR06zZ0V4yQAHxMYenRKQM
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe 2120 9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe"C:\Users\Admin\AppData\Local\Temp\9637503226fae7e5ef5c6fb1ebb523d335ffac22a3410b1648763145380ab865N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5934daeabfc74e960db0627f7dae0f00b
SHA128ed8ce5c3bb048d73b6d41e829358c0e7057460
SHA256a352cef6b5c051831ae3e78f70e358b115c1b80cfd8751b6bd7f67b37c36ec40
SHA512ee240f4c4bb21007ba8658a2d2912ee21e0a388cd0c7af4e69c56826aafaab97fdf78fb9bcb8d666821f8f70303a1e9ab04007b97b17f6345a45baa5dea59fc0
-
Filesize
1KB
MD5fc6e97c076027185f1970a924c00c6b5
SHA14b2aa2968a97461c47382d8d4cd050779e3f2071
SHA256f56476bf17d592c385104c8fe87d49c3eacbb1836378867535aaebbb1396c7e3
SHA5127b2e34076c93cf6d0ab14558a8c7b9601c1c34052e41b3ff9674712611f6aaaffc1181cfb835b9a23b9fa3600426901d89c1e5b1ff029c4b0a842f0a1e526ed5
-
Filesize
24KB
MD599b50694be285399c3022d50d78faa9f
SHA1d9374ec113a3431361cdb4a7b43e0e6037b2a438
SHA2564cac15569e87744b1464ce273d56546d91312c8c7f68ccbc6deb762c0838bff0
SHA5127cfc06b5e38e80a95cfd9aede1ef68c635045c9c8930953c45909efcf4924615fc18f8b954a1c4a56e868748dd93338e67e56f2d6314068e997d4c8f85dc4167
-
Filesize
15KB
MD56e663f1a0de94bc05d64d020da5d6f36
SHA1c5abb0033776d6ab1f07e5b3568f7d64f90e5b04
SHA256458b70e1745dc6e768d2338ccf3e6e86436488954ca3763472d8ffec4e7177e4
SHA5122a037c39f3a08d4a80494227990f36c4fef2f73c4a6ad74dcc334317a1372234c25d08d8b80d79e126881a49fa4b3f2fffe3604c959d9ceceb47acc7192cc6a5
-
Filesize
11KB
MD5b9f430f71c7144d8ff4ab94be2785aa6
SHA1c5c1e153caff7ad1d221a9acc8bbb831f05ccb05
SHA256b496e81a74ce871236abcd096fb9a6b210b456bebaa7464fa844b3241e51a655
SHA512c7ce431b6a1493fd7d1fe1b1c823ad22b582c43c8eb2fb6a471c648dd9df9953277c89932c66afd598d43ea36f4a8602e84cd175115266943071cbc8ce204099
-
Filesize
127KB
MD591b0372096274dbd47395aa8b28ffedb
SHA105d79ba090439c2898d8ad480355c08091acee55
SHA2560411ab18ecb0d3d6292eabb89b4c8e41112b3e0be272b087555c2cb8cb0bfc28
SHA512c40b9eace25b6c871eee9b4186181268de7463c4fe1c4c19372413989489fa891ebd528175d15df031dc768613a81c619acce0981a4c29d475e795d18b1aff08