Analysis

  • max time kernel
    125s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 14:27

General

  • Target

    Maono Link v2.1.2.exe

  • Size

    26.1MB

  • MD5

    8ecb41ddd315f2d1f6a845c20c076a51

  • SHA1

    39d4d4662f1ade143377b75ea3ee5e8d4441b133

  • SHA256

    490b1df82449341cd6927aed5af14addf139ad41bf4ccbf834adb648c57c4168

  • SHA512

    06948201ec44f33d0ad26dbf863071d83b2e9da9dda17ede9d308367cb23f31421b6b68894312577587ea4eed6199042ab6c0f3940dddbaa5c91b7a6f6de32ee

  • SSDEEP

    393216:vLQ+27nj50xmTbxb7unLEd+v0CzqH28HSua/Ly3fOkSpS0tjFZKNjU9vVEotV+wb:TYj5PT1OnwdD72GSd/w0pSru9EotHNl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Maono Link v2.1.2.exe
    "C:\Users\Admin\AppData\Local\Temp\Maono Link v2.1.2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy7D2D.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf