Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe
Resource
win10v2004-20241007-en
General
-
Target
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe
-
Size
252KB
-
MD5
40d24eeab4bf0108ef85472b095c83f9
-
SHA1
1a9c823ae5f090063dd69697ecb5e4c423395d2a
-
SHA256
dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a
-
SHA512
7b025d7fc909d2a5f67f5e118f5a8d1c5fd38aa2fa9ffc2d6d5ebf5a97c17784c12c107b193e11c0d27b7f64580ad7b8e296bf4a304c46b12fac759f6d9a44cd
-
SSDEEP
6144:r7lNs03h33GBGyYWgBOhF9Oa5WfWNOSbGqJBHA:Hl3hGBGy7Vj9p4SW
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 4972 hccwuab.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\hccwuab.exe dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe File created C:\PROGRA~3\Mozilla\sppzgaa.dll hccwuab.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hccwuab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe"C:\Users\Admin\AppData\Local\Temp\dfbe7f7552b8b471fe4b17d4ff78fe9a78d16af4ca82b4e6643be22b19aa472a.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:224
-
C:\PROGRA~3\Mozilla\hccwuab.exeC:\PROGRA~3\Mozilla\hccwuab.exe -bwwjynf1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5554c5e82225266ffb5041a5b1e04d1d9
SHA1a0008de058750450b1999ea99ece8aa6f5c2c27b
SHA2569c7487bae47e8a13badccc91bb2c2ae468e51f4d7e2f97f1a43ba20144cf9ab7
SHA512d4dd29354ee84660e6dc88f5eda2ef6334975c66bba6954b2fe5bcaf03a5253e3c46acdf68446565ea5eead91b1545019f0f0fdc18323e0df88f30c4bd15eaa3