Analysis

  • max time kernel
    134s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 02:46

General

  • Target

    dmd-2.109.1.exe

  • Size

    31.1MB

  • MD5

    268731d15b935cb5c46973ea98b9e7d2

  • SHA1

    39fccb3315636e90e97c76f3e9cb24e82f40d855

  • SHA256

    4163bd79ef89a5aaeef30890b68854f09331e32c75db7f47544382b62aad185e

  • SHA512

    a3b1c02b02a0b4c80b3f022aedeb80bc0c5670484dd7e9dc3d4fbb45079aa43c34e019bad56c3baf2769b16591dc6914d43231e68888e4b92489bd0cba5a3a1b

  • SSDEEP

    786432:OquNsmFkLEva1eo7Gt5wJNZyGLtiOE3lMD/yb:teFfa1e/bgNZysvqq/g

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dmd-2.109.1.exe
    "C:\Users\Admin\AppData\Local\Temp\dmd-2.109.1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsiA74E.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    09d8971beefefffd710030dd167a99e0

    SHA1

    a0117786ad77213f3eb48cfdc3819786cb796b7d

    SHA256

    caf64a4e9449220ba618a9aa2ae4ed3774c5d0f193bda44be22676c27ae0ec95

    SHA512

    3956f0c6bcdf033e4a10ab33872a66e0668da28ec31cb7a2c67ef7266d7c0845998a2a85a6cc25aba1df73909df8104119cf5f1f86c1e91f8fd201765aea49f0

  • C:\Users\Admin\AppData\Local\Temp\nsiA74E.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • C:\Users\Admin\AppData\Local\Temp\nsiA74E.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    68ba62d8eef644a45dd03ddb65c13174

    SHA1

    a8567acf307bb18a2a32fc675b08b3c1e11b2061

    SHA256

    d1b19797740fbf930ca34729f0590a38f7d98cd9989253db58a93bd957bef6db

    SHA512

    4f0dd04ce2bcbccf17bdc37e474ab9e1f357f722382ee38123c504923f521c459e0249f3541693ab31394e3fbdb9c62ed364b81fc20a12371dfc2aa1ac143a7e