Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 08:50

General

  • Target

    6dff4cafebd4bb246488526e09dc6aa1d2aa25681eb024439c08fda39a10367b.exe

  • Size

    10.0MB

  • MD5

    f08fc668957c17905520d63bae85114a

  • SHA1

    a802235e8e390cb700396f7ee6eda73c27289484

  • SHA256

    6dff4cafebd4bb246488526e09dc6aa1d2aa25681eb024439c08fda39a10367b

  • SHA512

    cedc25745fbd376627c119cfc481627ac574ae3d92f4d888538d88a344b57a66e47ca3f6ae7580ff154a5c11fd2325057cf194784c1e357f0756884d37e1da9e

  • SSDEEP

    98304:He5x6c1NogP2NhS9Yw8ywowUUIGYlFlehRC4tNuTBp8BzB+0LuxttZiSELtebmab:gJawfwVs3TehREvjD8th9VzW

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6dff4cafebd4bb246488526e09dc6aa1d2aa25681eb024439c08fda39a10367b.exe
    "C:\Users\Admin\AppData\Local\Temp\6dff4cafebd4bb246488526e09dc6aa1d2aa25681eb024439c08fda39a10367b.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Uninstall.exe

    Filesize

    10.0MB

    MD5

    1681b33bfc4ac7aeac92aa731574f38a

    SHA1

    73366c193c78a726ff2cae3c898a8b08b1b31b31

    SHA256

    28e22365ef1163cb5832603428836d5e81db3d589b826b49107a0bfa22d791e0

    SHA512

    085f96df6670f542a570147fab0883680080d84ccdb2876e3955db0831465ba16664311749e16a685e9dd9df24997c2138fb1842a0e7f9bd30bb845e826d0227