Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 19:17

General

  • Target

    c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe

  • Size

    2.0MB

  • MD5

    c5ca191ca4bcb6ccf9bc4ec4e8068ad0

  • SHA1

    aa94f38c74717550a62c364a4d0303655ac8634f

  • SHA256

    f899ba0544bacc7489d1888143d6e774b2704bab76e080b6274291ec1c2e0c38

  • SHA512

    6f38fdceb53d1138bdfdb4a4735e6b1fb3240ea63c53da3d9df92a1402083426b7abbf6e581189c655944fb5936adcb9efd829c5de6795d9115a1fb34cea7863

  • SSDEEP

    12288:ireCT5Rhoqcst+0n2oD7UzPacRWGARfGAncbE9salEWXlPjVDa/ZSBHnhvMCtjS/:iNhoPg9a/ZSFue+zxa/ZSrJovBYz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe
      C:\Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 144
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\c5ca191ca4bcb6ccf9bc4ec4e8068ad0N.exe

    Filesize

    2.0MB

    MD5

    3b6d8a744665086cbabfea0fc765609c

    SHA1

    6b5b7f88a504aae7f162d67f2244f7553ad41f9b

    SHA256

    c5ff945738b1482691d919545ebeb7faa2d608e12a174580f849c4d6fbd94b0a

    SHA512

    e8dfd5595e157cfe7561470b6df37b79a3f2daf36e69fb5469ac5d69ad6eb4133aa6e979705b94ca4d0ac95046dadc069f692ac29cf1acfcfa08b6e4e1d1c552

  • memory/2280-0-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2280-6-0x00000000030F0000-0x00000000031DD000-memory.dmp

    Filesize

    948KB

  • memory/2280-10-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2356-9-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2356-11-0x0000000002E10000-0x0000000002EFD000-memory.dmp

    Filesize

    948KB