Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe
Resource
win10v2004-20241007-en
General
-
Target
38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe
-
Size
255KB
-
MD5
f5305d6a8d8d83f4e8f65fd63fc6aff9
-
SHA1
966a90baf892a8d1cff1e6ba464e4c29a09b3a3c
-
SHA256
38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313
-
SHA512
49cb3f5889be0808dfee4acc1c81b194d04fa66075e1c39f52b6077ad598aac2964c74a3007191c0648f661bd16774a5c24855a801f9c767d49881f02a6c8569
-
SSDEEP
6144:9g28Oa0kdZDIcpA9xiNFiVg7s/LDoe+voS7g:9g3O7kj5pAh/3qvoS7g
Malware Config
Extracted
systembc
mailh.org:4001
Signatures
-
Systembc family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& ''\"" 38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe"C:\Users\Admin\AppData\Local\Temp\38ee04ee9d3b3912013d54483d8f822eebd0367408b369bc09f46cb339a54313.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3052