Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 08:32

General

  • Target

    Docklight.v1.9.21/Docklight.v1.9.21_setup.exe

  • Size

    38.0MB

  • MD5

    7174690c3be785ad79e2d8260febff79

  • SHA1

    d1134571ed3ac91da130e5c11765eb2ed7d29865

  • SHA256

    42b18379c5e638184ed4a8fda01926eaa0583ab0a4a37f42c995fe18cb64b93b

  • SHA512

    d0b4f8a47f8f486d7edffa059a1c86563680264f99776a0c7f2f275e1a07128bf88bcdc9c3a71900721923effe1bd2c963367040e206e1efd080b57e1280caba

  • SSDEEP

    786432:YSmXO8MHAyltfQktxY23oHzOkSBf3OOw9:lm+86tfQuxCikW/O5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Docklight.v1.9.21\Docklight.v1.9.21_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Docklight.v1.9.21\Docklight.v1.9.21_setup.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\Ibbv896\Docklight.v1.9.21_setup.exe
      C:\Users\Admin\AppData\Local\Temp\Ibbv896\Docklight.v1.9.21_setup.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Ibbv896\Docklight.v1.9.21_setup.exe

          Filesize

          3.0MB

          MD5

          55c14944083ced29441b6e91bab10d3a

          SHA1

          0df0c8a5d8ba562b7906ef91cb652875e87551c3

          SHA256

          a67f22826cd9a82b4a557d1d8c332ae01660f3924cd9c3c568a1b00cdf5b59cc

          SHA512

          1e08d633d020975d33162728b77bdff1512598d454ab4994692f07cdde0c56699bbd68d3adb752c2ce114a20f9e185570403932f4d78b87b13ff2ec22e06621f

        • memory/1152-10-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1476-0-0x0000000003490000-0x0000000003491000-memory.dmp

          Filesize

          4KB

        • memory/1476-9-0x0000000003490000-0x0000000003491000-memory.dmp

          Filesize

          4KB

        • memory/1476-8-0x0000000000400000-0x00000000016D8000-memory.dmp

          Filesize

          18.8MB