Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win10v2004-20241007-en
General
-
Target
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
-
Size
369KB
-
MD5
e4e56f7fefe037591b5115092d6ee990
-
SHA1
b8d25f0e321c32e22af6df64d513c1d88e9f592c
-
SHA256
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862
-
SHA512
c90369ee2284a101d964a850bca76f18608eed6c74c6f38f4e457006a227b9b504e22ebdddaed267e69293d98fe1e2d7c9f2e18fc213b1aeeb55243a4295dd02
-
SSDEEP
6144:c8LxBD6v9qhYrE2Z3igLitp6ULh4UG+y63WzaHV4KTL6UK46cbpJ2qbglQA:XYrP3X0p6yGB6Gza4KTj6Up5bglH
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 228 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 3728 228 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 83 PID 228 wrote to memory of 3728 228 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 83 PID 228 wrote to memory of 3728 228 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"2⤵PID:3728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ff488c7d8f8f03c34e67a7ac3ebeaafe
SHA1bbc4aacac09047d12f6ea5b54a24255e9389ba0e
SHA256b6f7a133237e590893ca7e6aceb76d96c8bfff8c767dcd4db53a57b366366dfa
SHA5129955013d4f601507ab35453a5b38063cadd2f75946ed998169d7fc42fe133deed31a0927693c8f131161df5281e0a2499b2b37359f7662b3e948c2cf407e11f1