Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 18:32

General

  • Target

    0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08.exe

  • Size

    80KB

  • MD5

    2d02ce91729edc9b21063ae6f7b1959d

  • SHA1

    12d0871f4cd61dcd1eded796866c592f4c1c6650

  • SHA256

    0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08

  • SHA512

    3c055ed456ca9889273e8960dadd5466032ba683996462eef154fc83338dd5bc7d23726369f10d17fef921737208bfc7abe3ea4f40690b8501b21ed1e5fec582

  • SSDEEP

    1536:ptm+CGIgcGqLHdTboDaeQr79vN0CmuJd4BXL:p69gILHJEDaeQl1Bbd45

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08.exe
    "C:\Users\Admin\AppData\Local\Temp\0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08.exe
      C:\Users\Admin\AppData\Local\Temp\0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0adb17506a066bfe0c04287f645d75c3f76bf3579b2df22c312b6688d81a0b08.exe

    Filesize

    80KB

    MD5

    6a36f8a30ffcfdbfbc56d9cafa313a9a

    SHA1

    fd06997decc8129bce85e89e5208ecfb406d31ae

    SHA256

    b42898c358d4ac0ba2f29d61ed54c3ef7f24c41a13b0025290ddb0998c796f24

    SHA512

    d1ffbda0f585409246c51f5509f182ade55c73b51ab8c345886e0c7d43eb24974e9a0cf89cee03539a45bc67364ff762d73eb1d170a10744d49cf1c1b7c80764

  • memory/1176-13-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1176-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1176-19-0x00007FFE10BB0000-0x00007FFE10DA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1176-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1176-25-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3148-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/3148-1-0x00007FFE10BB0000-0x00007FFE10DA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3148-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3148-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB