Overview
overview
3Static
static
3Trojan-X- Scanner.exe
windows7-x64
3Trojan-X- Scanner.exe
windows10-2004-x64
3MSCOMCTL.dll
windows7-x64
3MSCOMCTL.dll
windows10-2004-x64
3MSVBVM60.dll
windows7-x64
3MSVBVM60.dll
windows10-2004-x64
3MSWINSCK.dll
windows7-x64
3MSWINSCK.dll
windows10-2004-x64
3Subnet2.exe
windows7-x64
3Subnet2.exe
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-X- Scanner.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Trojan-X- Scanner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MSCOMCTL.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
MSCOMCTL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
MSVBVM60.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
MSVBVM60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
MSWINSCK.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Subnet2.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Subnet2.exe
Resource
win10v2004-20241007-en
General
-
Target
Subnet2.exe
-
Size
208KB
-
MD5
f18a1d0b7307da55b813ba696deb3cde
-
SHA1
bb682d298be08bacae4585fa3b107801893b8640
-
SHA256
4337c5614a926e3c15e63332e923d75916c2ebd5529916bc3da96f8cb8d0000c
-
SHA512
188f3ef2f84d2dd1b1ffb56f55f15f0fbfd396949b52b99ced08fffcf572d81d7a1fea3e3ce6af40b08c05795e94ab63a11b3e92f986e19e8aee7e68722f4619
-
SSDEEP
1536:pb7w95d0NfQZozCvvim0SchctNseNMhYu9m6L9RIqjMSH/cgyWs1QIr52W5uxIB7:pwv0NYZo2im0Zct2j3dlQ5a9P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Subnet2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3592 Subnet2.exe