Analysis

  • max time kernel
    94s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 02:45

General

  • Target

    81da307f6ebdfe9b7333214ecb7578ac.exe

  • Size

    93KB

  • MD5

    81da307f6ebdfe9b7333214ecb7578ac

  • SHA1

    2d14a0d7317309a0a6bfd5f9c238e08fb8ce77dc

  • SHA256

    87fa4f71ff9faabc9fe17e65a9c8583a789812ba8d6ff868d61d14455b305aa1

  • SHA512

    39dc804fe030b684228dc34600091cd4abf476a3c182345a675197ffb655d4abc2cfa73a8b8e9bdb78a2d785f258726aaf5981a914df4b3bff1f8713ffe8dedb

  • SSDEEP

    1536:e+mkHWT+KOo5rJ+aAXaJRGrSxTR3wuAlyT9sYmH7IHSTjQtfCdSDDCA:e+vHWx5rJYaJ53wVyT9sYmbPQtaLA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81da307f6ebdfe9b7333214ecb7578ac.exe
    "C:\Users\Admin\AppData\Local\Temp\81da307f6ebdfe9b7333214ecb7578ac.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:5004
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x150 0x470
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst7A03.tmp\Dialer.dll

    Filesize

    4KB

    MD5

    b5be0e441e04e5bf077a90097b169d22

    SHA1

    22fdf908102ae4f45e45b354e2f28a9ac17eb684

    SHA256

    7f267c0c300ee645624dbff22329d8a1e86c2e147ee803a34c43bdee76da0255

    SHA512

    3cfc02b01e67cea80354de4725ec66fc1314ef68ec577a2d6f9f9bb6f8c450c777fd3ce32c21a59b935b401151221d1506d7c795dcd4e59edcf9d6a15b14c2d6

  • C:\Users\Admin\AppData\Local\Temp\nst7A03.tmp\advsplash.dll

    Filesize

    6KB

    MD5

    0de5df3c9d2452bf3ab3f5f4f33b4234

    SHA1

    ec3e045db9d32074e374e1811a9ce6cc0940c1c9

    SHA256

    9104a91037ca7fbf0965dd7191ab5e945291275c0f0d27ac42d3b3c61021dc02

    SHA512

    9aa5c589910356cb7b50cc67a3cd92f103d3de0dc1524a85fe5163e0efb31252d0b99831ddbcfa887645ddf9c9a508ac94377371e890ea5f980ac893dc53f621

  • C:\Users\Admin\AppData\Local\Temp\nst7A03.tmp\nsisdl.dll

    Filesize

    13KB

    MD5

    e00dcb7f9504bd66911d1c290d4f0cdb

    SHA1

    27aacdcd9835a917b40d7938ab42999307d3a3cc

    SHA256

    8922810a1ed1e9e3b136d9b24066beccab0c2418177c81b43195bcc5461b0194

    SHA512

    612e2101ba07d7f9837c46ae4170436718af8fa538b2302a72dddee8dacd4a96ed93f4adcbb8a2678e39407fe7851618c388c58871a4127a42e024be3a2fdc1b