Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:34

General

  • Target

    296d5a4b7ae49389992d8add8334681d9cb7fa31b720a32eecc26ee070c206a6.exe

  • Size

    1.1MB

  • MD5

    c1e014f2ce7a49094fb694028207292a

  • SHA1

    0f9e70be8da2df949be128b8c40c79f0be68cc2f

  • SHA256

    296d5a4b7ae49389992d8add8334681d9cb7fa31b720a32eecc26ee070c206a6

  • SHA512

    bdb1a010257c76f8e2ea48c3887bab68bcb798012cc8642e975042e041ad961c3f46871f149da2543f35c311c91343e8b2c55f7817373f8b7c173551ff16d6fc

  • SSDEEP

    24576:kp9mNaOPOeZ4ZRQVxj3kWO1pgkysLbIqBcDu5GY/Hj4coCYHb0YLVU5:Qvy4ZRQVZkDIqBR5GY/HUcophO5

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\296d5a4b7ae49389992d8add8334681d9cb7fa31b720a32eecc26ee070c206a6.exe
    "C:\Users\Admin\AppData\Local\Temp\296d5a4b7ae49389992d8add8334681d9cb7fa31b720a32eecc26ee070c206a6.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\296d5a4b7ae49389992d8add8334681d9cb7fa31b720a32eecc26ee070c206a6.exe_v2\911e37e0-d71c-4bdd-a0b3-99ce50dad136.json

    Filesize

    891B

    MD5

    774283d1f5d995d8eb81addd16eaf68a

    SHA1

    635a15a27a17606f94b250b640c505aa52bf4090

    SHA256

    6addf0edfdb2277c1042b4ee38ac24710d02edcce0cd93d219dc09712b9a1673

    SHA512

    836102b205432f8c6a3848d2bc4b7d9abc25616c9981c9e8326eeb22a262f9bb073c4749c2b2da6a35685ba843e79e6329c45d36a7811789d10dc77ffdfa11c6

  • C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\296d5a4b7ae49389992d8add8334681d9cb7fa31b720a32eecc26ee070c206a6.exe_v2\UNO.ini

    Filesize

    7B

    MD5

    be9d6efbd8632e482c64618f00a701fa

    SHA1

    cc7c0702a34305282ba77d4eb88db1fa0bbed850

    SHA256

    d94fd0c7e43df0a03014a44d79653c0845adb29e6222ca47718c46af90847b84

    SHA512

    c59eee3a838ec35f447c28a701289f3f35ea5ec08d0c38df54482b39a2219598074d49fc162b1ef46d9e20c336221f53bc86de7163183193001b466ff36dd5c8

  • C:\Users\Admin\AppData\Local\Temp\dbb1b91a-af8d-49d1-87b6-5d94cbe11648.json

    Filesize

    328B

    MD5

    6b4e2954299d21d26bd7b43a811a49ab

    SHA1

    93652c6b97a4fc0d4fba519f76706b58a3f9509e

    SHA256

    e69d8b764f81e9e1fdef8c66e4e49dc15d603c15e33e8cdad73442eaf252fbf5

    SHA512

    a1e2b9535a9f429fbcc2c42494f6f49c33135b953e914a562f80098793363c2be058a25c87f914a631f8355df83c9c506ba88304ed446f93a7d65bb350beedaf