Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 11:30

General

  • Target

    De4dot [Modded ArmDot]/AssemblyServer-CLR20.exe

  • Size

    5KB

  • MD5

    c0bb148fe70f58a3fe5bc59b9fb75011

  • SHA1

    8b893ec93ec57e0797715658b7eedf6fab7c0ec8

  • SHA256

    db0e50089cf8b71e660bcdcdff7dde554f77ecbeb9469cd75bb1764bcedcd8b2

  • SHA512

    88d1f50caecafcd803747643182bf9f8458fe8beff896544cae7c8a7ba97812772c1d1bb8de2ce9d71b943b31ef13715e94a9d332798689cc7986f26b951224e

  • SSDEEP

    48:6C1FdJYL4jgDMPtPORGrlv7TpKKWMACCVCGpfbNtm:BBJ7jg2txHvRYUIzNt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot]\AssemblyServer-CLR20.exe
    "C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot]\AssemblyServer-CLR20.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 384
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-3-0x0000000002870000-0x0000000002871000-memory.dmp

    Filesize

    4KB

  • memory/1800-0-0x00000000748D1000-0x00000000748D2000-memory.dmp

    Filesize

    4KB

  • memory/1800-1-0x00000000748D0000-0x0000000074E7B000-memory.dmp

    Filesize

    5.7MB

  • memory/1800-2-0x00000000748D0000-0x0000000074E7B000-memory.dmp

    Filesize

    5.7MB

  • memory/1800-4-0x00000000748D0000-0x0000000074E7B000-memory.dmp

    Filesize

    5.7MB