Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 04:10

General

  • Target

    5170322383551912c2aee7db8a3fe290N.exe

  • Size

    821KB

  • MD5

    5170322383551912c2aee7db8a3fe290

  • SHA1

    11d09ff4ee8b69dd9ee0e3bc5224c2be1a293ad5

  • SHA256

    47d2e9925f39d39d1bb42e3f51ad0883a35fd81bc597cae2e6c2e07652d016d4

  • SHA512

    f5d1fcfaa822c915db8dfc0d281cb134ae25bcefda07c78dd5419de4fe7763dbc1a0e794b90374bfe29065457236c885ed71d7b6c773fab6e2547459c8b4e82b

  • SSDEEP

    12288:UT+Wiw2pQh1CYB79z5vcxsPW4jxj2j4sQDaEts1LEelxKJLZmN1SazY:UTT2Gh1VExV252j7QyEelELZmN1SazY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5170322383551912c2aee7db8a3fe290N.exe
    "C:\Users\Admin\AppData\Local\Temp\5170322383551912c2aee7db8a3fe290N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\9673.tmp
      "C:\Users\Admin\AppData\Local\Temp\9673.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9673.tmp

    Filesize

    821KB

    MD5

    c3513577f70efeb0d99f4f1447a238af

    SHA1

    df136b4b1cd4d2bb4dd53ad8fec0164f29c7c622

    SHA256

    9ac0616c6dc85b0fff8a0f4c71f92a607d4c47d8b708036a65d669884f81cec6

    SHA512

    ae5a7d198481ae43f9442f0f3a1c97c89d54b20ab8fbb2677962b450ee561026878e50031c1d669d5e04f689588b4a9c3aabd83168dada6a1cd190e3e9ad45bc

  • memory/436-0-0x00000000003F0000-0x00000000004BA000-memory.dmp

    Filesize

    808KB

  • memory/436-4-0x00000000003F0000-0x00000000004BA000-memory.dmp

    Filesize

    808KB

  • memory/2512-5-0x0000000000A40000-0x0000000000B0A000-memory.dmp

    Filesize

    808KB

  • memory/2512-7-0x0000000000A40000-0x0000000000B0A000-memory.dmp

    Filesize

    808KB