Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe
Resource
win10v2004-20241007-en
General
-
Target
0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe
-
Size
181KB
-
MD5
327aefdc6239557f8cf09f9c24ab5663
-
SHA1
aec288c98dcdf9d1753336f2e1bcaf01045ef35e
-
SHA256
0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc
-
SHA512
c88daf7dd3cbd3ca259e2d5aa1e83868b00ec6895995bd941ace629ad8b4f289782d619b044aee31f92bddb7557882e3ed5a318ff536aca51fc192f0f720ca46
-
SSDEEP
3072:mQchyinW3kIncLnntG/j/BJ5mTxjnw89JnszQcJdX2:mkin4kwcDtG/j/75YxF52dX2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 4804 hzydrme.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\hzydrme.exe 0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe File created C:\PROGRA~3\Mozilla\cctmeeg.dll hzydrme.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hzydrme.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe"C:\Users\Admin\AppData\Local\Temp\0372a8d24f7202764459bf5af9bf7f73b5b0d07be0283c7ef7f5d0bb1afc89dc.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2116
-
C:\PROGRA~3\Mozilla\hzydrme.exeC:\PROGRA~3\Mozilla\hzydrme.exe -cdshazl1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5ddbf7b7f68a88c0eaf57a21d03e36fd9
SHA1698abeca77b5ccc4f743240d1b4cca003354dd08
SHA25676530ba41529a2663839aec0099bacbde2a921f9ce3a8cd8de4f7a4dbc7a65d0
SHA5126b5b824b2336bb0333d7a370611d4f7781005790d134e24403033a889e18568a998347d685d65519f08e4798d0fa877ae96c1efcd19d826212fb67f60460c0a3