Analysis

  • max time kernel
    119s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 23:07

General

  • Target

    672ccd990c5fbdf1ed424c64d74458e0N.exe

  • Size

    2.7MB

  • MD5

    672ccd990c5fbdf1ed424c64d74458e0

  • SHA1

    93fb45c439f9aba8a767bc5a9dc9abae5a349d8d

  • SHA256

    552fcb950922445a3d5dfcf8526e7ac0a2e6d27ced7338078e3af1ca09f64db8

  • SHA512

    6157f80f923fd4dc36d0815520fe6ea28fc9c13025013b9fe4372543fe2a580ac797b1e74af67d323dee8d69006ca879d4715acc6011a0300bbda527aaf7e8c7

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBT9w4Sx:+R0pI/IQlUoMPdmpSpX4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672ccd990c5fbdf1ed424c64d74458e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\672ccd990c5fbdf1ed424c64d74458e0N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\FilesWD\devoptiec.exe
      C:\FilesWD\devoptiec.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\FilesWD\devoptiec.exe

          Filesize

          2.7MB

          MD5

          8cec1ed3f2a2f2d2dd02d2dfe88fef3d

          SHA1

          5bd4e94c9afca2e825e93f352ff49a40f1e18341

          SHA256

          3aa905feff7b76769e549976cfe1ab329601b36a7a068ffe51e26aa4b7a51bd2

          SHA512

          0627c87cb4f71fbd5ee0679cfee0ced5a67417a8ea66624e5d0393b7ffce18b0c21655d4ea1a044c8ddf5bef5600f1c3c421548750814976be78c269ac827fdd

        • C:\MintYJ\bodaloc.exe

          Filesize

          2.7MB

          MD5

          0fe7bfe763db87a403f6bd1132221fe2

          SHA1

          1616d8784ead667d86929909fd719c6d318dab1a

          SHA256

          c90396039f512789cd0f6a9ee7a2da11ccc03bfd5be3188c2877dd44be671081

          SHA512

          448e9ca0e4026a75d5a89da1324b7bcb13dfec37cd8c9cd169f5b91a447e20f5195574d3e0d21b414ccb0e46f3392a01b8e083efd01ec64c263c6ab86b5f9c6e

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          202B

          MD5

          1970a158139e9a2bd032de803b95b218

          SHA1

          ea273399396ee45f2d8c3b41ea4508fb8cb16396

          SHA256

          00104bf271fc605997bda0a62cde342c2dfa945659a3789d983e737189bba052

          SHA512

          98def974c084fb7aa8a16573a7f07c3724759882efb1a2062d470a7ea7e1f89b42f9623618c984af2d967882c16ab1ca3d9f03bae7b8a9bfa319e81a6dcfc39f