Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 02:24
Behavioral task
behavioral1
Sample
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe
Resource
win10v2004-20241007-en
General
-
Target
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe
-
Size
3.7MB
-
MD5
56078814b6ce3536d4a4040e5dc3840a
-
SHA1
da7c81230f212e32dfc62de9114a4d0fb1c5930d
-
SHA256
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852
-
SHA512
e00bce379212438e501e2f027aadddbf8a07fd1b9a18b8cc3b0f8e2323a0010ba0dffee584889d1bfbc13e662b86ffac5911b2c17163abb1531387c36ef56251
-
SSDEEP
98304:A6+OyDN0KCiRrvf7aKpePMcDLEj2Jel4iUf:sOyrrvf7AE23ellm
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-1-0x0000000000400000-0x00000000007B4000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exepid process 1708 55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe"C:\Users\Admin\AppData\Local\Temp\55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708