Analysis

  • max time kernel
    377s
  • max time network
    377s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:25

General

  • Target

    e0ff79cc943f489668067ec3be11398a084a76ecd0283c9e18b2d0bf6e464c32_not_packed_maybe_useless.exe

  • Size

    89KB

  • MD5

    276e5289101e0536abf03736217f9fbd

  • SHA1

    2631f18ca5631d265c6e4ffc8eb1fcfbcf1c68bd

  • SHA256

    e0ff79cc943f489668067ec3be11398a084a76ecd0283c9e18b2d0bf6e464c32

  • SHA512

    fa7f39599f9aa689f7944930704106a6c294715a9d0984cc0624aa666da87cdfc4315b865d07874674ba14cf91df43dd54f15fc4ed2f18c3acb9ed0a5119765a

  • SSDEEP

    1536:Af/YvFSSZtDgN+DrDkDEFtClfF89lGL+v:m/Yv0SZtDgN+Dr+EcfF89ll

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0ff79cc943f489668067ec3be11398a084a76ecd0283c9e18b2d0bf6e464c32_not_packed_maybe_useless.exe
    "C:\Users\Admin\AppData\Local\Temp\e0ff79cc943f489668067ec3be11398a084a76ecd0283c9e18b2d0bf6e464c32_not_packed_maybe_useless.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\dhqiiylrjiashxnahpkvmwffwzdhxjak

    Filesize

    16B

    MD5

    5643e2590826d85cd09f97dd6a8ec012

    SHA1

    9424646c927693cc2d8b2d3ac21622f015fe1ed2

    SHA256

    fc9fbae8e11bd7c664a3a4203303fe43125e72db0d7c8d68d36a244e3293066d

    SHA512

    3ee054843470d3bb0b330d4b4dd07996195da1cbb131eec2125c2dbd6ab6576c2bf202af279c6432a4cfb2d3c623af7ce5205c567c94d096c1828068c31fe7d6