Analysis

  • max time kernel
    94s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 07:44

General

  • Target

    97257c50e8ebd6943173366ec2270c31c5ad9ecc589575c794306fd49c8afd8d.exe

  • Size

    4.5MB

  • MD5

    f3be35113fa87b9213c45e146d448a2d

  • SHA1

    fa9bf12e1c4a04b2e9f899e413be8c1a7cc5dd25

  • SHA256

    97257c50e8ebd6943173366ec2270c31c5ad9ecc589575c794306fd49c8afd8d

  • SHA512

    eea96f29c1db74b07fe9d584aa691803015e66c278474e95e8fa41330df088be4a113acf5ec2f5a0934a3f41b4d0e10e44e7a1ae1895f8564a6e97a94ccda220

  • SSDEEP

    98304:nvumyF5QoUDheFI/lpNOFHbBtwodaaSoyd3YgZQ8B8dL94jY:nLUFFINpoFHbBtwodasydogZQ809oY

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97257c50e8ebd6943173366ec2270c31c5ad9ecc589575c794306fd49c8afd8d.exe
    "C:\Users\Admin\AppData\Local\Temp\97257c50e8ebd6943173366ec2270c31c5ad9ecc589575c794306fd49c8afd8d.exe"
    1⤵
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tmp84DF.tmp

    Filesize

    4KB

    MD5

    661e8ccf7182f1ad0b3774fef08b633d

    SHA1

    d571cb2a1263af6251c75ae5fe2249fff3fab72a

    SHA256

    7124ce12edbe629ab084b603901ba8dec0cb497bca0f74f9e953f9e8e82a3066

    SHA512

    0ad26d4027e89afd5f388ecd701da4de8b447bde8dd1c4d8582bcad3e52833d92eaabaf1fe235e83bdfc320231927ac2b5420c47e0ecb3a8fc3c2cb3a75fe7ec

  • C:\Users\Admin\AppData\Local\Temp\Tmp850F.tmp

    Filesize

    1KB

    MD5

    78ff5e740204e0e244a6d43d7b078f39

    SHA1

    097008df39ff9f8b23834981bfb31f58e70d92ef

    SHA256

    c13116656282407ad0eaf70d8eb4981c92e559d1f9174c50fb1d2931fbacf6ec

    SHA512

    7ecba0fc2dc8056ba73482a143fc22b1e0d83e3e02430010dc5aafeb73d2c62cf960f2bd25d3ce5345b952ba999fbfb9fcac9c3aa86963f1221c3c1d60e12781