Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe
Resource
win7-20240903-en
General
-
Target
26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe
-
Size
91KB
-
MD5
bc6300e498907b7418fc62c4541988a0
-
SHA1
0a2b7f67a41ae1d1177b13ff9745c7c1fd378956
-
SHA256
26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88
-
SHA512
712658b2509f8b79c68a18f97932ba6f949df0fbef5a2baaab891c73f37daab5dcd767a4c1efc86110acb9a3176305d3bb71b0aa763354b03187c156a319b430
-
SSDEEP
1536:h4cYfpS/6aH73YhHXgcmFhegC0fFaFAQOwGxR:I8rYhHX+FoXWgmQheR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2972 asfesoak-oucoab.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\asfesoak-oucoab.exe 26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe File opened for modification C:\Windows\SysWOW64\asfesoak-oucoab.exe 26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe -
resource yara_rule behavioral2/files/0x000a000000023c1f-3.dat upx behavioral2/memory/2972-4-0x0000000000400000-0x0000000000418000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe"C:\Users\Admin\AppData\Local\Temp\26e07829cf00d1cc21220fcf80de4ce8360b1befd6cd842449227992b2eeca88N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\asfesoak-oucoab.exe"C:\Windows\SysWOW64\asfesoak-oucoab.exe"2⤵
- Executes dropped EXE
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD539ea6aa0df8191daf1bdf9f416ab86ad
SHA1334cf58cbf991b917961fd6f4125eef4b6a580bb
SHA2567075ccc01503f625aa8887ad5dc1ae58661825d431aca6df83a2c49c58f323e8
SHA512decd3c15f85775175944cef1523bae695afed00a175831b52488ed33d3d8fd67d7c493978621cdd0a4645d2873fb54b6479a8fdc3b4215b52e9323b6ee60a963