Analysis

  • max time kernel
    26s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 05:02

General

  • Target

    $TEMP/remote.exe

  • Size

    67KB

  • MD5

    71c0a16bad347349ea62d30b76bcc326

  • SHA1

    841087fc28fb4812e0c2898ec8ac9049d3bcf593

  • SHA256

    235d9e96c68a262c1d6093fa499c8ffc14f41cca8c79dc289bdb27d70b7411d3

  • SHA512

    7d4ddb4e70d49cc1c221abf68b71f579200adefb1d79fdfd414494b32f11a004aafb3715e8131e382c61277a99abbc374ec7448f176d235bd2da581d71610fc5

  • SSDEEP

    1536:Mppv5CNE2E/n/fn8lvOvNOH4KJJ6CR4Romu/BsKO+sqCZnAucg8s:Mppv5CNEhf8FH4KJJ6045y5CZ9Is

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\remote.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\remote.exe"
    1⤵
    • Loads dropped DLL
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso10D3.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    01776e92060ac00338d0367e49518384

    SHA1

    928f7d41e59a1f9fefadeea6226c5a223ebcd699

    SHA256

    f144d17060052ce6205fdf717a647f6b4e20c268fea14e81efc26356d00bbaab

    SHA512

    2da8cb9c0cb7ff983b137d321f48f5ecf24600c1b52570691ed527531cdb61c98f8b2cf0c53446cb4e7f98d571f8e2591a3f3570ac9722abbac25648866d9881