Overview
overview
10Static
static
100468127a19...1f.exe
windows11-21h2-x64
32a3b92f618...6b.exe
windows11-21h2-x64
10b154ac015c...cf.exe
windows11-21h2-x64
8b96bd6bbf0...69.exe
windows11-21h2-x64
10bb8e52face...3e.dll
windows11-21h2-x64
8ca467e3323...a4.dll
windows11-21h2-x64
8e93d6f4ce3...ad.exe
windows11-21h2-x64
10fa5390bbcc...f6.exe
windows11-21h2-x64
10Analysis
-
max time kernel
71s -
max time network
75s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-12-2024 13:45
Behavioral task
behavioral1
Sample
0468127a19daf4c7bc41015c5640fe1f.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
2a3b92f6180367306d750e59c9b6446b.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
b154ac015c0d1d6250032f63c749f9cf.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
b96bd6bbf0e3f4f98b606a2ab5db4a69.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bb8e52face5b076cc890bbfaaf4bb73e.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
ca467e332368cbae652245faa4978aa4.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
e93d6f4ce34d4f594d7aed76cfde0fad.exe
Resource
win11-20241007-en
General
-
Target
0468127a19daf4c7bc41015c5640fe1f.exe
-
Size
121KB
-
MD5
0468127a19daf4c7bc41015c5640fe1f
-
SHA1
133877dd043578a2e9cbe1a4bf60259894288afa
-
SHA256
dd1792bcdf560ebaa633f72de4037e78fe1ada5c8694b9d4879554aedc323ac9
-
SHA512
39cec4cdc9e2b02923513a3f1bc3ac086b0598df77c7029493a810dfbe40c946fa62905d1dcb80aba87c9e74677aac893108faa94e027c261aff7d388bbdcdfc
-
SSDEEP
3072:5HYBf8YzKw/MHfBTU3eiu0B/qIbmuvFT8whrQnFW:5HY70Bou0B/q6IOrQnFW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0468127a19daf4c7bc41015c5640fe1f.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1624 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0468127a19daf4c7bc41015c5640fe1f.exe"C:\Users\Admin\AppData\Local\Temp\0468127a19daf4c7bc41015c5640fe1f.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3308
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5ad7a569bafd3a938fe348f531b8ef332
SHA17fdd2f52d07640047bb62e0f3d3c946ddd85c227
SHA256f0e06109256d5577e9f62db2c398974c5002bd6d08892f20517760601b705309
SHA512b762bae338690082d817b3008144926498a1bd2d6d99be33e513c43515808f9a3184bd10254e5c6a1ff90a9211653f066050249030ad9fe0460ec88335b3d423