Analysis

  • max time kernel
    101s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 07:24

General

  • Target

    cd4e4b00c31293aae2be359f113eba20N.exe

  • Size

    34KB

  • MD5

    cd4e4b00c31293aae2be359f113eba20

  • SHA1

    e866ae528b057332b430c66d9a824aa3fd32bfea

  • SHA256

    d4d34133c54f58b3ce7bf0e0d680849483f6c94dce8b71758557d1eca7542f89

  • SHA512

    3ecf4ce6fe8947e1bddc041054606b0c53dcdef3184015468db7fb88c2ff38a4ed57573d23004f965b426819738c061c065c7212daf2ce96ec6864fab2b5ec2d

  • SSDEEP

    768:6eeI2//kFi7tCV6rtfZYjBUfyL4Mk9WBNvnFRtD5n:622nkFi7thRfZYtUfyL4Mk9WBNXt1n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd4e4b00c31293aae2be359f113eba20N.exe
    "C:\Users\Admin\AppData\Local\Temp\cd4e4b00c31293aae2be359f113eba20N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\AppData\Local\Temp\ofadebux.exe
      C:\Users\Admin\AppData\Local\Temp\ofadebux.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\ofadebux.exe

          Filesize

          34KB

          MD5

          6335cee1bb64fae6c56b9c554658b399

          SHA1

          d6c387de9c0dcd7d6fd48da3459ed730e965759c

          SHA256

          7f7e6e5834a6640d7610771f90deed289a8c1e72e4f9250345487e385bac93da

          SHA512

          183e42bd16d292226c8235d295a2eda6e764ab7b8849b53fe07ffd3d449b41943060f4c7c91d4e59451985df988311cdf8f94c0e6a47a8120941e01443413134

        • memory/2564-1-0x0000000000401000-0x0000000000403000-memory.dmp

          Filesize

          8KB

        • memory/2712-6-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB