Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe
Resource
win10v2004-20241007-en
General
-
Target
d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe
-
Size
71KB
-
MD5
3d79950da9e61446bd21a79b93cecb83
-
SHA1
31210a979a5d8724dbbd8bb3a6f540e5b5f1360a
-
SHA256
d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d
-
SHA512
cb9652e4cf7cbd76fe7d40100640b26cb5c25520f94ba4df990788ef6c7bea7576538238673a526d5164c9cf608130e163f4c02b2ae8924312c8cab7661ab044
-
SSDEEP
1536:13KBnQAAya0fCCZQvG+PNqnD0VaEoESg4mr:C5dDEkCSg4mr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mmoapot.exepid process 536 mmoapot.exe -
Drops file in System32 directory 2 IoCs
Processes:
d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exedescription ioc process File created C:\Windows\SysWOW64\mmoapot.exe d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe File opened for modification C:\Windows\SysWOW64\mmoapot.exe d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe"C:\Users\Admin\AppData\Local\Temp\d93deb945e938a47270d878db4618a35fcdda7045683bf5438dc1b44e5ef1c1d.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Windows\SysWOW64\mmoapot.exe"C:\Windows\SysWOW64\mmoapot.exe"2⤵
- Executes dropped EXE
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5499f2c14f202b33ddaa3accae7477dc7
SHA13840eb7dcb5ab244e3408a98c4bdbdd58a81cf89
SHA25639ca72f32a402b22424f818a02efadbbce5d108fedf4839d6ed9ded43222987f
SHA512f34cb7b7dcf6edbb4e65de5f9e456c6e6fc6d8266fe74854ead8834896d8952beb0c6e41f1cc5e45cedef2a005582a1234d6af522d7574997940e7bdef16a091