Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-01-2025 17:40
Static task
static1
Behavioral task
behavioral1
Sample
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
-
Size
280KB
-
MD5
bace252b49b68a0099f8ecdda382b250
-
SHA1
49c319ec9fdebe5e8d896a9825fe128bc6a29af9
-
SHA256
fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8
-
SHA512
85b88f965fc2f4c4e9bdf34a6846d696f5759d99a8c64db3487d5e9afbfcb8494fd05751361feeed309ea8834526cf83130a535f446b8afac5de9bef111e5ea0
-
SSDEEP
6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66f32:boSeGUA5YZazpXUmZhZ6f2
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe"C:\Users\Admin\AppData\Local\Temp\fe62431c50ad3f194cc5a51da58d0c1d8281ada4d910f51cb1df27f66a681ab8N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵PID:3632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5433c075d723956cf94f14395404709b8
SHA1bfafdf4955a5efed9ef64b8aff7bce51517a1dc8
SHA256f08393b1b474a10e142e3fe75caadd35690a4b806a94d37f9b92bea9308a6063
SHA512826f20eeaa52dfc732b76b6dc63d069daed72c5564d3bba6247a9ad542d43c86eb7a05f31d33613f219a79aaeb5b0fe5cdf49fb95ca8d6541409f7ea5002ec0c