Overview
overview
7Static
static
34cff1513b2...bd.exe
windows7-x64
74cff1513b2...bd.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/haren.exe
windows7-x64
1$PLUGINSDIR/haren.exe
windows10-2004-x64
1$PLUGINSDI...sm.exe
windows7-x64
3$PLUGINSDI...sm.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
4cff1513b2a691dfe377d66e3d7c7e20d3a1c81fab40c2ea31d5f02629bf97bd.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4cff1513b2a691dfe377d66e3d7c7e20d3a1c81fab40c2ea31d5f02629bf97bd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/haren.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/haren.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/realism.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/realism.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/realism.exe
-
Size
139KB
-
MD5
fda656c75b581d0dce6537d159052bcd
-
SHA1
a06523896f54e51a1a7269356634cc0bbb069edd
-
SHA256
4ce66c1b06bab37a85a93c5e7d7c9ba6f79da608fab33a00c44b8b0a9443309d
-
SHA512
8e7928c0e0439da880b7f2b036aa4f89cabb365bfe83c17184336580101c96d3b1f2c2ddc254a99a73d7cd0e203c40a1b22f68ad803070d2537c82fb95718106
-
SSDEEP
3072:zs5j0FMPXJKD4va+Rr3LkR8NjQwnSSxAdw0OJfrSheFvIbE7NPNGv6iBDQlU:I5j02Pk8a+R80EwhnJfrSheFgiCQq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language realism.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe 4880 realism.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4880 realism.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\realism.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\realism.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4880
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2cc 0x5001⤵PID:2228