Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 17:36

General

  • Target

    3856e3b047e611fdd81ec52038dca630N.exe

  • Size

    73KB

  • MD5

    3856e3b047e611fdd81ec52038dca630

  • SHA1

    fe979e03a5672f8345619fb59550217406259784

  • SHA256

    361b523225bed9a10ae2ead054a328507d85febe54ebdf56cf74bc173a9af64c

  • SHA512

    c4da868f16cba2a4f1345f30d6232b92306bc759096e2fc7d7b39b808fa5c120da6ab3a2c14e2df930cdff2ae3e7864785a41de895c2669708925f9b03d84156

  • SSDEEP

    1536:hb2ABIIlTajK5QPqfhVWbdsmA+RjPFLC+e5h90ZGUGf2g:h6Wl4NPqfcxA+HFsh9Og

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3856e3b047e611fdd81ec52038dca630N.exe
    "C:\Users\Admin\AppData\Local\Temp\3856e3b047e611fdd81ec52038dca630N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c [email protected]
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\[email protected]
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c 00.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    73KB

    MD5

    890974533e12d80bfeba128ed74087f9

    SHA1

    c9c8dfda22522a3bfc8f5e137f256b5c871322bf

    SHA256

    634ab8f8b5f504b28819cbd360daa076af1b768a2c1d17484f65fb506f3b2bc0

    SHA512

    7127c7e3ed7ac0bc752d7ca4a289506bca356fd8da809ae796693c8972b2d1ae0f3ee705da87312f0976ae3b3422b8a3545431f7c0a45dadbe7ed277e2495f51

  • C:\Users\Admin\AppData\Local\Temp\00.exe

    Filesize

    2KB

    MD5

    7b621943a35e7f39cf89f50cc48d7b94

    SHA1

    2858a28cf60f38025fffcd0ba2ecfec8511c197d

    SHA256

    bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991

    SHA512

    4169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1

  • memory/1388-8-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2872-7-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB