Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 04:05

General

  • Target

    KeePass-2.57-Setup.exe

  • Size

    4.2MB

  • MD5

    4c1cafc2b3a380208548620a3d53dbba

  • SHA1

    a4c6ae220ecc6b907e56200809edab3bcdc38b30

  • SHA256

    ea53f7f944fada950cd7bb154deb078123a357b7bc5e2484851762b3552eb48b

  • SHA512

    b2a63cff7b7f01c753dac2723e4ca02b2e86e1ed77741f4254b229f3c79e63aa7392fdbb0ad550055b7438c2a05a8536b71ee05b9afb88a72997f8907490d83b

  • SSDEEP

    98304:hkLaasz0D6H/jUdBfhUEKMEoEGfA58ulnYBh+oKLeOKIaE:yaaszr/WrKv7PPoK/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KeePass-2.57-Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\KeePass-2.57-Setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\is-OBHB5.tmp\KeePass-2.57-Setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-OBHB5.tmp\KeePass-2.57-Setup.tmp" /SL5="$400F2,3483957,781312,C:\Users\Admin\AppData\Local\Temp\KeePass-2.57-Setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-OBHB5.tmp\KeePass-2.57-Setup.tmp

    Filesize

    3.0MB

    MD5

    515a9f60ae3e548bba65c2d6aba98f75

    SHA1

    6c68ec325522a413e87daac52da8135d5b2a71ca

    SHA256

    88fa32ce3c8c9fa0781e812dee4f6eca307c5c4a50d6a1aafcbcbce94f0c91c1

    SHA512

    7f34993c9043d9b808a9652324d1bff90643f1516c50f4e09b85151cf5b3047a3bdb30923ffc0227bfd1b19ff27fba767b88dedd18db97be8c9efa28b0faa7a9

  • memory/2084-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2084-1-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2084-10-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2192-8-0x0000000000400000-0x0000000000708000-memory.dmp

    Filesize

    3.0MB

  • memory/2192-11-0x0000000000400000-0x0000000000708000-memory.dmp

    Filesize

    3.0MB