Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
lonelyscreenwininstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lonelyscreenwininstaller.exe
Resource
win10v2004-20240910-en
General
-
Target
lonelyscreenwininstaller.exe
-
Size
538KB
-
MD5
64da00119c76c6e1d75f059ffc4a772d
-
SHA1
ebaebff7db60430cad107d4efc45654d43f98075
-
SHA256
039004b76a1bc5ac020958256bdcf97f1464398c13b0be2e0d0078f1aee8b3a7
-
SHA512
d13544aa2ee6060510c0f906e3f174a4ec40878f36193a99d6c527b62fa6a379115e965e272069b0e3f0479df16e6899a096ede37fb0832262c72d3d24f824f3
-
SSDEEP
12288:AS3yBV888888888888W88888888888pKfXGU69eTutORzK/AA9i6Zub02O9HtFbl:/3yLKfXG6wZ/D9kqtZaTq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 lonelyscreenwininstaller.tmp -
Loads dropped DLL 1 IoCs
pid Process 5012 lonelyscreenwininstaller.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lonelyscreenwininstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lonelyscreenwininstaller.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3416 wrote to memory of 5012 3416 lonelyscreenwininstaller.exe 85 PID 3416 wrote to memory of 5012 3416 lonelyscreenwininstaller.exe 85 PID 3416 wrote to memory of 5012 3416 lonelyscreenwininstaller.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\lonelyscreenwininstaller.exe"C:\Users\Admin\AppData\Local\Temp\lonelyscreenwininstaller.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\is-9QF99.tmp\lonelyscreenwininstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-9QF99.tmp\lonelyscreenwininstaller.tmp" /SL5="$E024C,164153,114176,C:\Users\Admin\AppData\Local\Temp\lonelyscreenwininstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD516881920cbe9ddb46c3ef29ee405a857
SHA10f76cffc2e57cf5c481a8015d203b96638d36ef5
SHA25659abe5f46020cb56e1079df8dc1145b2033e4b1459ae3d92f637064a6b618bc1
SHA512f07d1f4133a2ba2bda92fa6f55360fae73e44b97756ee3044f31af5f9e01cda34e7efbb1520c0b5aa2a496edc03ed4fefdc4ad419c1028b1ce6457b69aabeba0
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555