Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 17:37

General

  • Target

    3354d0a897915a904504ead99a3993d0N.exe

  • Size

    1.9MB

  • MD5

    3354d0a897915a904504ead99a3993d0

  • SHA1

    e4f4022d41b4d54a6bec301fd5610ec22cc23244

  • SHA256

    06e7da0e8cce56fbb104ff895c7b50e9febf6b9bc98a5d54a439ed44758310ec

  • SHA512

    4882c7ba8b5160a7be3226ef889140e748cbde518c1e8747cddc8904445753b329ffc3f407f162e9c9b1ff47905c909f796f5733a94e9a6f50bdd1c0617066b9

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dCwsdmi9ZOferJL2nMZnSb57S05VpcGnyzoYC:Qoa1taC070d6GrDozoYkcV+wSCWi0uK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3354d0a897915a904504ead99a3993d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3354d0a897915a904504ead99a3993d0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\A812.tmp
      "C:\Users\Admin\AppData\Local\Temp\A812.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3354d0a897915a904504ead99a3993d0N.exe 08F99514729AC2F017866E327742D5E3A601A2B3BD927F372A4467C185FAAAC18B1C851AECE611C4238275C588059A26592072BAC2E43D69D9C00895F5E86A89
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\A812.tmp

    Filesize

    1.9MB

    MD5

    6041d40507764c60e87a4c9d6e9bf623

    SHA1

    c8965eb327ca4178a259b154cd03d0b47084059b

    SHA256

    3681e268322b380afe78607989fc15e18727bec9581641349f086bf61407ec7e

    SHA512

    9fb1af33238c31db570bff79bdd8aceb92edc24f3debf8ef7897d192192b3959c7b7e74b75c26f2f0ede9309cc1c4107859b0e9cbd9aa1fa1f63d98ebe3ac1df

  • memory/2108-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2908-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB