Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 22:33

General

  • Target

    66d2adc09e737744198baf71db943a95c4196324a38538b2268963cab226fd3d.exe

  • Size

    41KB

  • MD5

    3912bd83ae9bf6e936e9437721ff7e9c

  • SHA1

    49bf01a650dd23f112ffb31100903005833abc67

  • SHA256

    66d2adc09e737744198baf71db943a95c4196324a38538b2268963cab226fd3d

  • SHA512

    5edf45a0fce086739c838604529f12cf499f96b681942d7f617efe6fb895526779d3894f1dbb395966a3a20a6996f0348a173db512a05719e0ed982027f64294

  • SSDEEP

    384:DLR7iSYIwM+6GyXzQNSOwOmOzO6iQspWGqYx1jYCKt7VpEi6xX+K2OexXjbuR6xT:DLR7ix70zQozpW7YYCqgiQ0OEmAmMn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66d2adc09e737744198baf71db943a95c4196324a38538b2268963cab226fd3d.exe
    "C:\Users\Admin\AppData\Local\Temp\66d2adc09e737744198baf71db943a95c4196324a38538b2268963cab226fd3d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\lasis.exe
      "C:\Users\Admin\AppData\Local\Temp\lasis.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lasis.exe

    Filesize

    41KB

    MD5

    620603307c86bf03aa883b2f7940c698

    SHA1

    c7919bc3601abddc178a0f90262dcac58a82ee30

    SHA256

    71fff47b371fb67ab65e70304fad8a97f13bfe84319914ff51c0982d3ca2aa28

    SHA512

    4da3a6f67a29ca10814220ddde0a7ded1b71b7993a643dcef63c589b85cdaa9d40204351ad076629c8d7edfa414596a7d40abeef0beca43950c51fdfe423f45e

  • memory/2088-1-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/2460-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB