Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe
Resource
win10v2004-20240802-en
General
-
Target
e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe
-
Size
9.9MB
-
MD5
389707c4f8f0c31e2291135a4145e30a
-
SHA1
319c48460bae6e6cc005193e51098371cb7de0e1
-
SHA256
e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812
-
SHA512
e703efd3ec3b00bd2636ad1242861aecbfdc2b0220a5dfd29fe8d1e3f7eb431d827a587592bd7a6e62a7dc28fea88703cc1a0a6f5e04cf11cf01d42722d482fe
-
SSDEEP
196608:tuJ9HKIbqWGSPTXhsf31Nloa67+SXgzSiFL2d3PzkX/xYb:OAIeW5XOP1NexrgznNv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe 3940 e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe"C:\Users\Admin\AppData\Local\Temp\e55832313096f6cd11f0d6e394172e0f3070894d339c624c3b8642b816d37812.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4148,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:81⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD59134ef6a44e4a9cb311e1139e4590812
SHA17ae8250a4afd225dbc8420183116e8af1cf15cfe
SHA25630000de63dd389b0aef61d01cdae2ed38f4bc0e03ca04e585780ca7b55b47662
SHA51277fa1b7ff4dd4d96041b5b0f6df62b4cea39820163d12921af5fff5a959f26078441e6fd5652f7d4b72565a5fe4e217e869efd724d910d531d24637c5cb74ed8