Overview
overview
7Static
static
3My Program/Afdbr.ico
windows10-2004-x64
3My Program/Afdbr.ico
windows11-21h2-x64
3My Program...cy.exe
windows10-2004-x64
1My Program...cy.exe
windows11-21h2-x64
1My Program...AR.exe
windows10-2004-x64
5My Program...AR.exe
windows11-21h2-x64
6My Program...00.exe
windows10-2004-x64
7My Program...00.exe
windows11-21h2-x64
7Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
My Program/Afdbr.ico
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
My Program/Afdbr.ico
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
My Program/RockerLegacy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
My Program/RockerLegacy.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
My Program/RockerLegacy/WinRAR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
My Program/RockerLegacy/WinRAR.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
My Program/unins000.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
My Program/unins000.exe
Resource
win11-20241007-en
General
-
Target
My Program/unins000.exe
-
Size
3.2MB
-
MD5
aff219649afa568ae2a283fe31b403f4
-
SHA1
44b4e832270c613d565f64a5a55487e58c7d8160
-
SHA256
528dd55855335341bb396c2ee75a8b41e6896c96578055d051d0301673f3907a
-
SHA512
1ac746eec2033f46ae6fd05b5c9c1812bae76dd9de23a5428ee1ba37c894be2e7c2353ac7bcea185546c29a8d6d9c9be2cc192dbe4f3b5c503dc7b6f05cf3028
-
SSDEEP
49152:qdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQ93336j:8JYVM+LtVt3P/KuG2ONG9iqLRQ9333q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1388 _unins.tmp -
Executes dropped EXE 1 IoCs
pid Process 1388 _unins.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _unins.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 _unins.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1388 1848 unins000.exe 82 PID 1848 wrote to memory of 1388 1848 unins000.exe 82 PID 1848 wrote to memory of 1388 1848 unins000.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\My Program\unins000.exe"C:\Users\Admin\AppData\Local\Temp\My Program\unins000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\iu-14D2N.tmp\_unins.tmp"C:\Users\Admin\AppData\Local\Temp\iu-14D2N.tmp\_unins.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\My Program\unins000.exe" /FIRSTPHASEWND=$702622⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5aff219649afa568ae2a283fe31b403f4
SHA144b4e832270c613d565f64a5a55487e58c7d8160
SHA256528dd55855335341bb396c2ee75a8b41e6896c96578055d051d0301673f3907a
SHA5121ac746eec2033f46ae6fd05b5c9c1812bae76dd9de23a5428ee1ba37c894be2e7c2353ac7bcea185546c29a8d6d9c9be2cc192dbe4f3b5c503dc7b6f05cf3028