Analysis

  • max time kernel
    94s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 22:35

General

  • Target

    6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe

  • Size

    7.0MB

  • MD5

    fdb51b23c2f9e1a1e4c3af04cc05274b

  • SHA1

    2d5414d5b74f632a4af1470f1ee747041b150804

  • SHA256

    6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848

  • SHA512

    0117f5a078b69607f17691fd7ad0646e5f4dbf00ce79b601d65039eef5d0385c68056f3d24ff2006276ad5e304e8e595a67055b0312169e6f422209014fa097c

  • SSDEEP

    98304:emhd1Urye2NZAhDV6OSV7wQqZUha5jtSyZIUbn:elWNZQJ3S2QbaZtliK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe
    "C:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\98A6.tmp
      "C:\Users\Admin\AppData\Local\Temp\98A6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\6384009b323474e8417295866eb37d94632ec7da919733d2020bb5d5fc990848.exe 053BA8C20BBDFB2D8A941033671843B7F7C16292EABCA61DB0829F2967DAF16AC8EAF3700EC2A556A97CAC9BE0D8B378555BD44D31B5787B7F38CB143B372AF9
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\98A6.tmp

    Filesize

    7.0MB

    MD5

    d1a04bc03903c42877d77bdf8b28e1ec

    SHA1

    9c44aafef5a46cff03f1a8d5e6b7576e4a47e63d

    SHA256

    064511d61979f7fcc06dafdf3d13089d3e2d1fe78092b6225a630e29ea6bf363

    SHA512

    653c303057cb8fc984d727e8d503ec99ed05da272802775eb14c5c7d475cffbb08b4cd9e8a1348be1ca09850c41c4fb7c1a2d5e4f06d4acd9f34decf0a30cd00

  • memory/2068-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/3548-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB