Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe
Resource
win10v2004-20241007-en
General
-
Target
f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe
-
Size
96KB
-
MD5
e0dfcd6969559d75a8a5644f78c573f0
-
SHA1
7b5efc8d02b9c3d3f7665ebbb49e5b017b309460
-
SHA256
f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42
-
SHA512
fb41ff53e90d920b14315deeaafc7956b805afc60750fb7717e6a8070bf35fad7943a155fdcbfebf9484b2e766e0d0780d2d0b4eb8f8d750b1eda9d9f35450cb
-
SSDEEP
1536:b8D5HZtGCW/TaIfq+YO4i1dGAd5XWx1FrhpHHRo0a:b2tqHC+kCdGAfMhx
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe"C:\Users\Admin\AppData\Local\Temp\f6f59add849774004ed79f840d9e8cb9319931e5b76447b8c41d3d9990bd8f42N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:448