Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 21:52

General

  • Target

    1423c37bb3f5412ff8829fbc99a55800N.exe

  • Size

    1.2MB

  • MD5

    1423c37bb3f5412ff8829fbc99a55800

  • SHA1

    7f221cded7b7123d819d7d099ad2cf1670dadf5d

  • SHA256

    d393efd44409614d3600a51d67f1842de04f5662c2bb3b756e0871fac5292d98

  • SHA512

    95171e4ac04e294042ff7f28994355e1173e7d71dd9c397a8f0a5389e92be72741e738a08df6efae5605b5370cfc464557033a1f1d6a442b0b8e8a7e8f30aa77

  • SSDEEP

    24576:99xB6oMksLWSk9a/ZSkJovBYLYsSwdaJ+4I:hdMksLTk9g+I

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe
    "C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe
      C:\Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 144
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\1423c37bb3f5412ff8829fbc99a55800N.exe

    Filesize

    1.2MB

    MD5

    01973931be3f3135abbb7814a8bd1f77

    SHA1

    07e2f01dabb2ebffcbc34c1c3c58f59883dbc73f

    SHA256

    5e64d5916e45f6a42538547226b1773fe799e29e75681ca5e9f2711f92c24e9f

    SHA512

    4321585c722ab6b6f16d1e8f599cbbc3271cf14ddd7907688b6e34ce48a2efe0075c195f88832b32e661db5d2f5508da2c4313742f609e07cc909ae8f002cc68

  • memory/1840-10-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/1840-11-0x0000000002EB0000-0x0000000002F9D000-memory.dmp

    Filesize

    948KB

  • memory/2336-0-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2336-6-0x0000000002E60000-0x0000000002F4D000-memory.dmp

    Filesize

    948KB

  • memory/2336-8-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB