Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 06:53

General

  • Target

    73368423b1887911f781f49c538efe60N.exe

  • Size

    5.4MB

  • MD5

    73368423b1887911f781f49c538efe60

  • SHA1

    1058a0e6bbaeb83c85d410b6b3b9197c5fa72fbc

  • SHA256

    f23a53f55327761bcd45e6159101f0c632f02b1593a61f737e5953b6fa037bf7

  • SHA512

    3ecfddd640ba7f762c9336a315730665834bcdc0b10ad3eae2b38bb75f36af5463888cc3e1a53b13cd9b35fd93cd964a03a3a5ced1db101043990f875283e0d8

  • SSDEEP

    98304:emhd1UryeoQ42oE53gV7wQqZUha5jtSyZIUh:elIEW2QbaZtliU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73368423b1887911f781f49c538efe60N.exe
    "C:\Users\Admin\AppData\Local\Temp\73368423b1887911f781f49c538efe60N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\D00B.tmp
      "C:\Users\Admin\AppData\Local\Temp\D00B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\73368423b1887911f781f49c538efe60N.exe 022789083EEF209B257C5A3F43E8D07509ABEB9DACAC5191D7D4721764991146180523891DC7206DB8007CD7C4A10BA31D121047DCA3F9073BAEF1B96298B974
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\D00B.tmp

    Filesize

    5.4MB

    MD5

    9a9fb8361e7ed29a80202c7d6823a878

    SHA1

    ea33ac33bd522c1081cc74c3cc0a5a9056e939b1

    SHA256

    289ed6b13ad47ae1f45da750c6f13bf132dd85cecc5f245004838539e6b2bcad

    SHA512

    4303edbb31b82b5d88e02353ac88343031ac465eeefc8c274605eb2f5efb2858b9c21e988cfc2df8888e1f5ab5ffeee953ed36f03c50a1dae30376ba35eed9d5

  • memory/1648-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2348-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB