Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe
Resource
win7-20240708-en
General
-
Target
88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe
-
Size
12.5MB
-
MD5
99418584672f53a83413b6d2684bcdca
-
SHA1
ac0a67308a31ca905ea131d3c656b2e31996dfff
-
SHA256
88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e
-
SHA512
12e32223096650587038b20d254c4ff5d3103fe031f3d9d06e0436dc10b0caeef5799bad5831a8b49f4296f888d151574a05de783fad5978c54938deaec2f946
-
SSDEEP
393216:rbxyJThSs1aPVqm3o0pkVrwVjpfPvl056OKtr:HCT91aPUmY0pIwV9HcKt
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1084 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe -
resource yara_rule behavioral2/memory/1084-28-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-32-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-60-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-58-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-56-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-54-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-52-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-48-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-46-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-44-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-42-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-50-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-38-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-36-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-30-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-40-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-26-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-24-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-22-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-20-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-19-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-18-0x0000000004350000-0x000000000438E000-memory.dmp upx behavioral2/memory/1084-34-0x0000000004350000-0x000000000438E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1084 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe 1084 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1084 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe 1084 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe 1084 88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe"C:\Users\Admin\AppData\Local\Temp\88458951e1c5f8a31b1308f8031a047fff0fdbb8ee5156648803250a46ce9a7e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD54bc970a97300b1a725d44bba23d8697a
SHA16f1eb181153692814e038e2f851d0734646f78f8
SHA256c9d8fb5311ae6018dc1ca72774cb7efeba5c115c827a5cfb795b3580499e323d
SHA51203968ca876b7e584de0a1418cca1dd2036fd0b4744f86d69aee5691a42061e284f8d9577293ef3f656be332f7da5ca276f85c6393bd6d8eb7de181baec0285f8