Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 03:54

General

  • Target

    df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe

  • Size

    61KB

  • MD5

    a18ce4e28bb6d6601d6b5c36c4f8c3c0

  • SHA1

    0f47e99afec7a13439b9291d862e5b437c610840

  • SHA256

    df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82

  • SHA512

    2fe7949bc01762ae725006854bb0a8a933333bb1445555b2a0f012eb27847f073acd475fd21a221597fd45289ee20d0383d37fb29eda6556fe8cacf04cf61352

  • SSDEEP

    768:peJIvFKPZo2smEasjcj29NWngAHxcwKppEaxglaX5uA:pQIvEPZo6Ead29NQgA2wzle5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe
    "C:\Users\Admin\AppData\Local\Temp\df97654d5646c4b709d5267e2160e8c0399288b62378b64b9cbc81ab667a8c82.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
      C:\Users\Admin\AppData\Roaming\ewiuer2.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\SysWOW64\ewiuer2.exe
        C:\Windows\System32\ewiuer2.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:904
        • C:\Windows\SysWOW64\ewiuer2.exe
          C:\Windows\SysWOW64\ewiuer2.exe /nomove
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          PID:4172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    a8c42a5805266698ce43123ae5e21135

    SHA1

    29c5dd2e1b0b2bbc52f521466dcc8bc01be41515

    SHA256

    142519ba711765d2b78499ac18a10937c160f079cd31ade023b1373ccea4fddd

    SHA512

    7270c42331edcefdcb33a70045a23fe0613fcb057575ca9d6da721462f6c8b74ce6c91edc38ff1ba25f6b31ed8355f8710c092cb62bf800bfc72522913ea3475

  • C:\Windows\SysWOW64\ewiuer2.exe

    Filesize

    61KB

    MD5

    3396581eabcd14f6a8a1281c02b8444b

    SHA1

    ab47d3a16c271accef87ebf6cc1f8d8347e02454

    SHA256

    1657c199973f25d0283f750e072d5926c72937e7de305fa7019755e5c79a963c

    SHA512

    d679707bf9114527e70b7d8b45ed52340581eaf287b173c83b5027fb425202d2367bfe4bb53149f5c6f09d1984d79adb929f62728e74004ccc8420690ccbbcec