Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 13:04

General

  • Target

    9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe

  • Size

    1.2MB

  • MD5

    d4845c534c9b98fdef93172c373302cc

  • SHA1

    4630b4e22439ef363ae367a7b4d01ce21047fe74

  • SHA256

    9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d

  • SHA512

    1a3cbf9b43c993e71fb217e54b875127233d3341e607dc81f44cea409d243938ef4f101dbbe5a4e84a2d984a8d6da965f0fe5dcce8d04942cba658d6b5e04aae

  • SSDEEP

    24576:6AHnh+eWsN3skA4RV1Hom2KXMmHar7LlU4oVmCBQ5o5:Nh+ZkldoPK8Yar7zoVmC7

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe
    "C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\9b36314e5306f0ceeb40d97b4df985e8fde6c78c77667dd32ab6bc42ea32361d.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autF4EF.tmp

    Filesize

    280KB

    MD5

    f10ff08e15fbf9f3cc42286481092d42

    SHA1

    111739e731ae9444e41813de99c33d5016bb865d

    SHA256

    71baecf5a6e1e0f927238123c2d2b8adfcc2bf65f75bf7ed3b344994ea5b0c1c

    SHA512

    2d882169b9eb8eb5bea4250a937c6bd6aa5b74db436856379567aa8197a5a138495a23ac082e04c0e11cf8173dc7e731547641dac5458a953902b4f2066f2ba3

  • memory/3464-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3464-15-0x0000000001400000-0x000000000174A000-memory.dmp

    Filesize

    3.3MB

  • memory/3464-16-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3464-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3940-13-0x0000000003D50000-0x0000000003D54000-memory.dmp

    Filesize

    16KB