Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
OpenVisualTraceroute2.1.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OpenVisualTraceroute2.1.0.exe
Resource
win10v2004-20241007-en
General
-
Target
OpenVisualTraceroute2.1.0.exe
-
Size
59.7MB
-
MD5
e6e92680d841069e27a0bf58b7d22449
-
SHA1
fae382ecb29bbf73568881beda276c3cb834e870
-
SHA256
fe56c2e2015fb5b5e269a235c315d62f49c6508492e69b2538ab8d993a62c448
-
SHA512
8557dd4124152a06d5e545229d79d97e5aba7f41bc70565faedd0a2b38e1b4c1515ed79b19bd844469fe12d06a3c9b530bb3e85c514dcaf32096c78bf6e35beb
-
SSDEEP
1572864:1PBFDMqJ1ISWSfZrjoqP6guG9TT4hUlu9+tFiR2:t3DDJ1ISWSJoqiguGFc9+ziR2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2124 OpenVisualTraceroute2.1.0.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OpenVisualTraceroute2.1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OpenVisualTraceroute2.1.0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2124 1772 OpenVisualTraceroute2.1.0.exe 85 PID 1772 wrote to memory of 2124 1772 OpenVisualTraceroute2.1.0.exe 85 PID 1772 wrote to memory of 2124 1772 OpenVisualTraceroute2.1.0.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\OpenVisualTraceroute2.1.0.exe"C:\Users\Admin\AppData\Local\Temp\OpenVisualTraceroute2.1.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\is-BV6AB.tmp\OpenVisualTraceroute2.1.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-BV6AB.tmp\OpenVisualTraceroute2.1.0.tmp" /SL5="$60244,61705116,875520,C:\Users\Admin\AppData\Local\Temp\OpenVisualTraceroute2.1.0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD51d0d43cc69c949c2adffdf99f755d1fd
SHA157960b19b98bd04b38888a3fee37d8e84915f483
SHA2564ed8687d840a5141f937af903d19b0054d82697763f81da61c232758da3cf02b
SHA5126404710802458a3504bb527cff402f8af32f4dc0d020577c90d7e1f09c1c5e777dcba0e05163cf4a0185d7a458ecb1cb760482be48e822568e3d84751f8d14b9