Analysis

  • max time kernel
    16s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 10:10

General

  • Target

    bade6ff42998612d4ae147e9a6126130N.exe

  • Size

    505KB

  • MD5

    bade6ff42998612d4ae147e9a6126130

  • SHA1

    de027a946e4a07ef6af4124bc98efe849e59b9b7

  • SHA256

    0dbb9e1eeff7b45a3ea1b87d06b2d041532f167c09167d73152820dc2d63d000

  • SHA512

    f84e9cc9ba92d06d647b2b177fefe24f9438c4a26881f8cc3303755c97ed14e881e4da66c261692c8024306cdabe54819c57fa1c8e771338f4c5b41b4662f624

  • SSDEEP

    12288:wlbU+b1gL5pRTcAkS/3hzN8qE43fm78Ve:WbU+G5jcAkSYqyEe

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bade6ff42998612d4ae147e9a6126130N.exe
    "C:\Users\Admin\AppData\Local\Temp\bade6ff42998612d4ae147e9a6126130N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4528
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev8666.tmp!C:\Users\Admin\AppData\Local\Temp\bade6ff42998612d4ae147e9a6126130N.exe! !
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\BADE6FF42998612D4AE147E9A6126130N.EXE
        3⤵
        • Executes dropped EXE
        PID:4264
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev8666.tmp!C:\Users\Admin\AppData\Local\Temp\BADE6FF42998612D4AE147E9A6126130N.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bade6ff42998612d4ae147e9a6126130N.exe

          Filesize

          505KB

          MD5

          c40225b4babe9bb6b6b1e6b5467c166d

          SHA1

          14e6c4f8827a4903e19558d09c073d325a45be7e

          SHA256

          fa31378e59d9f6a7bc749c20586c2cb56a47d00e01d54f72f2b233e060f367a8

          SHA512

          d9e87431531e4c4deff6d19873d9f5c66428772f0fa11960b1f4ea2905cf0ed13a5e0c122030d89520a16fab89846cddc0c4f527281b5323386b73ff5c3f1d57

        • C:\Windows\MSWDM.EXE

          Filesize

          47KB

          MD5

          2af966e7672f1e9c626245551247fb3a

          SHA1

          e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c

          SHA256

          6b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8

          SHA512

          dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e

        • C:\Windows\dev8666.tmp

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • memory/2320-22-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2320-17-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2428-0-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2428-9-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4528-11-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4528-26-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4556-12-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4556-25-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB