Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 06:02

General

  • Target

    69be3d3443e619b7df35cc7e8f9f6a50N.exe

  • Size

    5.4MB

  • MD5

    69be3d3443e619b7df35cc7e8f9f6a50

  • SHA1

    acaf1cb8ec51d54e8d3b0281bd02b059b66791ce

  • SHA256

    130a9133e751221a661fc2f9c4eda28faa9f309528812d76fbf3f170af6533fd

  • SHA512

    2a2d44fa0a97e85ec68d581c21fc551cd9ab4e2bb244870f1ac1942af143204ef84d2a5934c3af33dd0b1e3acaade64ba8d961cb9f9a32d3947bcf9fca42f259

  • SSDEEP

    98304:emhd1UryeOpuwTInFmqhucZaPIV7wQqZUha5jtSyZIUh:elJcyhEPI2QbaZtliU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69be3d3443e619b7df35cc7e8f9f6a50N.exe
    "C:\Users\Admin\AppData\Local\Temp\69be3d3443e619b7df35cc7e8f9f6a50N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Users\Admin\AppData\Local\Temp\D3D3.tmp
      "C:\Users\Admin\AppData\Local\Temp\D3D3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\69be3d3443e619b7df35cc7e8f9f6a50N.exe 3509B49BAC20C44C83C33B7CF301B84A4E631B23DE2B028ABD3AD9C5338BCADD88568632AAFB757DA8AD27B3F0F446030F5282BFF49AC6844C5DBFB8AF678333
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\D3D3.tmp

    Filesize

    5.4MB

    MD5

    afd7de59ca9125112554fdedff2d84f0

    SHA1

    e3a3476a4f22d2412ee91621aa465b94f025495e

    SHA256

    b197cddcf336b244a27240b7b49aeabff02b26bedcbc1d6722c47e712e32e099

    SHA512

    452c862045dba620282d44f41bdbc6ceb8b476c46fbf129d3006f3b02c31a1aff9e3052bd98d4c6e48a8ff834f42a37a3bb31cf78d89d42708480e794b644011

  • memory/2276-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2608-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB