Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe
Resource
win10v2004-20240802-en
General
-
Target
848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe
-
Size
417KB
-
MD5
59e2c2cec52d4976893f9e4fce67b3c0
-
SHA1
60a7ff7258b98dcab0025c488be47255c3c3da31
-
SHA256
848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444
-
SHA512
c069c97fac15550176c371069de84bd6f00012abcd9f4f1bd9c45288eac4ab28c981e1be4c82d953f2d5568b9f2841c6c588b0c9f025e36584ea2b3df52a73ac
-
SSDEEP
3072:z4fP8fWEwFLU1tRFe4VAWOy3PNJTS4cZ2gxjVfuE1AT/i:zFWEw1UvUVs/T6Z2QJmE1AT/i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet = "3099311615" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz = "4192" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz = "4192" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (int) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet = "3099311615" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier = "AuthenticAMD" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString = "Intel Core Processor (Broadwell)" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString = "Intel Core Processor (Broadwell)" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier = "x86 Family 6 Model 61 Stepping 2" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier = "AuthenticAMD" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier = "x86 Family 6 Model 61 Stepping 2" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier = "AT compatible" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1\Identifier = "x86 Family 6 Model 61 Stepping 2" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0\Identifier = "x86 Family 6 Model 61 Stepping 2" 848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe"C:\Users\Admin\AppData\Local\Temp\848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:1456