Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 15:43
Behavioral task
behavioral1
Sample
mikogo-viewer.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
mikogo-viewer.exe
-
Size
5.1MB
-
MD5
4133b22db3e170155c34e042019fec68
-
SHA1
7048505a88b2a700e8cf94439dc02d9ca6b252d2
-
SHA256
e16e341ebe95bfa7df5245eab63a4a78bbd80f08719e50f5abe50273589aec08
-
SHA512
e846203780ae5c3b8bb32c062dacf4d5bd3060d0d3ef008741f18c2d806ea852a75b7efed33285a2f730f5201bd5f3b69c602c79d1d51f281583b2c3adcfd370
-
SSDEEP
98304:OHU50AxE2K19rwTYP6rf6fWBeY1GudajFLFKL0Ee0K++:5OAxAr43rf6m1REjFLFtEe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4532-0-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-8-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-9-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-10-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-11-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-12-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-13-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-14-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-15-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-16-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-17-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-18-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-19-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-20-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-21-0x0000000000F70000-0x0000000001D30000-memory.dmp upx behavioral2/memory/4532-22-0x0000000000F70000-0x0000000001D30000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mikogo-viewer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4532 mikogo-viewer.exe 4532 mikogo-viewer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4532 mikogo-viewer.exe 4532 mikogo-viewer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4532 mikogo-viewer.exe