Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 01:04

General

  • Target

    775823ac0f200964ea5033ded918c310N.exe

  • Size

    1006KB

  • MD5

    775823ac0f200964ea5033ded918c310

  • SHA1

    197e202b215fc701ab242185011087b7f1de5458

  • SHA256

    b5dd438bac149b3e8a508a3ba0f1aa2dd92546f44e23092a702b8f99e37dce72

  • SHA512

    8365a1a8b9b246d5d2bcba23441cf0ad4f29223b75a6ccb8f0394e62140b335ae0f54e4377ceca60775847b3b0652501dc16312e2a2450071dd885a9ed3dabf2

  • SSDEEP

    24576:SgV83LzXYJLKSMech6ispJzc5YYmsRr6ylMwpbdgaocZ0bD:SgVLKRWTQ6Zs5DhgPf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 24 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\775823ac0f200964ea5033ded918c310N.exe
    "C:\Users\Admin\AppData\Local\Temp\775823ac0f200964ea5033ded918c310N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\775823ac0f200964ea5033ded918c310N.~01
      C:\Users\Admin\AppData\Local\Temp\775823ac0f200964ea5033ded918c310N.~01
      2⤵
      • Executes dropped EXE
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\775823ac0f200964ea5033ded918c310N.~01

    Filesize

    977KB

    MD5

    6fb65b639646a9c39980a10e979fb997

    SHA1

    580e75a4d187caf25e6ec5d89a0683c449cd43f7

    SHA256

    f6a02dca6c0144f041c6b9519374ea3fc16fc21699f8d38c1714d7e45874d4bd

    SHA512

    4f67da4c6119583b75939933311329d79d1c2f1ff9e449340139fd00e0d7b84ca5f8df9255d70abd58749310517b5c8c01d743f686e22ac6655471299eefe6cb

  • C:\Windows\SysWOW64\SYSLIB32.DLL

    Filesize

    4KB

    MD5

    6e73cb58137d97124ee2586b74d3bd49

    SHA1

    3a7c23eb151b19a9cd111b81b087fdce5a96725c

    SHA256

    7d15b0e888c40b3e229fb43d5f2274e4822e92c3ba61bd622e045d233721d6e9

    SHA512

    93ebd1a7d312486f8c2d91f84f57f3c2ca3b745c75b457ae20c437b64951341c71deb45e58f906e8b0d3235912e0c31e296cf925fe496d4e81a69c78b5f414e4

  • memory/3612-20-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-10-0x0000000010000000-0x0000000010005000-memory.dmp

    Filesize

    20KB

  • memory/3612-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-13-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-27-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-34-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-35-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-42-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-49-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3612-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB