Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 21:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Cloud Extension.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
Cloud Extension.exe
Resource
win11-20240802-en
windows11-21h2-x64
2 signatures
300 seconds
General
-
Target
Cloud Extension.exe
-
Size
3.8MB
-
MD5
c40c5a3b80b66a9f339cbf5558985b0e
-
SHA1
eaf0200d40b4fe2bf493cdf2e03117627e9c2da7
-
SHA256
a89fa37c96f0a9229e1b19868de92cb9022516e43dbbccea012074aef2f0a8d2
-
SHA512
705153b51d840059636d2420c0562ae74b2f68839001423eb2ca359b6b6fd8ec971a59560f07bfd062af85ab9fa0c9314410408783e87cf3b378dbfb9b57b469
-
SSDEEP
98304:dAtP0nU/FsoIfTBrHJWGs2NyqeoNE/7SRYYp:PsFsTTVHJack+H
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cloud Extension.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 1704 4820 Cloud Extension.exe 90 PID 4820 wrote to memory of 1704 4820 Cloud Extension.exe 90 PID 4820 wrote to memory of 1704 4820 Cloud Extension.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cloud Extension.exe"C:\Users\Admin\AppData\Local\Temp\Cloud Extension.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\appdata\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\.\appdata\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Cloud Extension.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4172,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:81⤵PID:3220