Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 06:42
Behavioral task
behavioral1
Sample
2024-10-29_878bb01dcb17cbc542e36e3267cbbeb1_avoslocker_cobalt-strike_hijackloader_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-29_878bb01dcb17cbc542e36e3267cbbeb1_avoslocker_cobalt-strike_hijackloader_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-29_878bb01dcb17cbc542e36e3267cbbeb1_avoslocker_cobalt-strike_hijackloader_mafia.exe
-
Size
558KB
-
MD5
878bb01dcb17cbc542e36e3267cbbeb1
-
SHA1
750c04ae58d909c5f474ca68c34da23e5b645168
-
SHA256
639d1d555e9ce1c74642ffad317f4f99e714d5cdcf007533f65cab8f6f8c0a3a
-
SHA512
02a65cbf8ccc8fc2197dc465167b155286f06f209a7d7cafe4912c73709a176b9b1eff0238fb02796a89b3a8f23e9f7b2623e88b38e755f491913573a088f719
-
SSDEEP
12288:rhyTurb4C9y7vJSm1t3aJXMOlabM2jObU2SMvsqFn9rBz3mLEPFzXWxVIc6n:rYTskC9y7BSm1t3aJXMOlabM2CAmv/xL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2060 4724 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-29_878bb01dcb17cbc542e36e3267cbbeb1_avoslocker_cobalt-strike_hijackloader_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-29_878bb01dcb17cbc542e36e3267cbbeb1_avoslocker_cobalt-strike_hijackloader_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-29_878bb01dcb17cbc542e36e3267cbbeb1_avoslocker_cobalt-strike_hijackloader_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 3762⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4724 -ip 47241⤵PID:3360