Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 20:35

General

  • Target

    L2.exe

  • Size

    836KB

  • MD5

    090dbb95c1140e3b9ec7310639025bdc

  • SHA1

    9bfe8d147dbe8d5f8c1fd7ff4523e2c0973c93f5

  • SHA256

    e393c188cfe21a8962a959e3e055ef18b8f4d14b616ca5ad8f79a3060b1f96f6

  • SHA512

    aa76835bd5018255615aedb962b88a9bf90ef0292b396bcf00fdb366ab6d24d4804e55d67c880f009b12066e1db8e8305468c92620bc49d5ed4ce3f1187ec7ce

  • SSDEEP

    12288:HSUrNvhHCDoBfurZQaexCD9b7nrd+o9cXWxy8LZZZ5j:HTNvhHC0BGZexCxbHd2WA8LZP

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\L2.exe
    "C:\Users\Admin\AppData\Local\Temp\L2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C start l2.bin IP=127.0.0.1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2756-10-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/2756-15-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB