Resubmissions
04-11-2024 23:08
241104-242eea1rfn 1004-11-2024 05:23
241104-f27yhstpbs 1028-09-2024 10:19
240928-mcp5qssgma 10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 10:19
Behavioral task
behavioral1
Sample
4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe
Resource
win10v2004-20240802-en
General
-
Target
4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe
-
Size
22KB
-
MD5
ee653dcd9ed87ec3319c0f443c8a54df
-
SHA1
63a45f8da331e303a8ae7e93df190a4443a13b57
-
SHA256
4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814
-
SHA512
e9cd28d1f6d4d9ddff7943021e3795489941f419aabd649b378d5d0992316751c5418068983b5d26feb6178c2ace2c12dded94839d1f70c6e59682c26562f5e2
-
SSDEEP
384:IsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZSZQ:/f65K2Yf1jKRpcnupQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings 4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2324 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe"C:\Users\Admin\AppData\Local\Temp\4a3f69c2613f4a514b1c904f7e019990d68718fbfdbb6ffe2896c50489ea5814.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4604
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2324