Analysis

  • max time kernel
    32s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 21:34

General

  • Target

    0caa6fb680e981e7d3353f19f830903c9e6438ecb14ddaa237ce747619d7d4c6.exe

  • Size

    513KB

  • MD5

    888ddaf3d1539e84e9b6de38263fbbe5

  • SHA1

    03a207de60e69dd6b7d293d4d3ec9d7b6c29a197

  • SHA256

    0caa6fb680e981e7d3353f19f830903c9e6438ecb14ddaa237ce747619d7d4c6

  • SHA512

    ba311147160b50edab59a0472bf01c175e6251371c8a0dc4a7b0e0e4bbd83ebcbbb9616f7066c564344a7ca6e636718adbe612618747bf0b00718c9a973c3903

  • SSDEEP

    6144:G2/Bn4odwxr8E9XNgShcpR9qNYShcHUaW9KN4ShcHUa8/:xtZqxox/vUauvUaK

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0caa6fb680e981e7d3353f19f830903c9e6438ecb14ddaa237ce747619d7d4c6.exe
    "C:\Users\Admin\AppData\Local\Temp\0caa6fb680e981e7d3353f19f830903c9e6438ecb14ddaa237ce747619d7d4c6.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ballelong.bat-

    Filesize

    514KB

    MD5

    2698b609f0de65d017a591f668b04923

    SHA1

    18b2e23d95895dfde5d79914a354aa2999ef111a

    SHA256

    5c7babf69bb8b19ffb3dc8d00248ebd4083f5271d63ae398a1429bc351c4ef4b

    SHA512

    19873e87f98de4d6a6d0708e857f9ea25f84bf01b4e99e758f887a4da93284eb69633373935b540f02d3951ab089b5542c1a5b92e072414db75bf180f3db0255