Analysis

  • max time kernel
    15s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 17:28

General

  • Target

    12c6001edad94e6143f35c84d966ddc0N.exe

  • Size

    90KB

  • MD5

    12c6001edad94e6143f35c84d966ddc0

  • SHA1

    96346e02062df4aabc198f237d94e8789d2bdf56

  • SHA256

    4427e235f2a3e6f0d96b1278a5343c704c872bc649f2d1e116e56b1536cd6265

  • SHA512

    dd8dc40c515474384fa24185c24bb9c693e6b51a73af2baf5e4545cec06557c3717bd7888ad5c8eb308fb304e386e1196a71c2a172fe7e0a7aaa64bb6daecb89

  • SSDEEP

    1536:0V/xtK9o7HscXIM7j5OaXrCJs4V2Yb/QfTWCgUNMXKxOzaTS0mVWEW:0V/xthsc31ryDgNb6axOTxEf

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12c6001edad94e6143f35c84d966ddc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\12c6001edad94e6143f35c84d966ddc0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\12c6001edad94e6143f35c84d966ddc0N.exe
      C:\Users\Admin\AppData\Local\Temp\12c6001edad94e6143f35c84d966ddc0N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\12c6001edad94e6143f35c84d966ddc0N.exe

          Filesize

          90KB

          MD5

          57098f4b5e694dc4a69830970ce8b02a

          SHA1

          d690518aa81a0ace3a0906859f4b7b0d6dc0720d

          SHA256

          0cbbdfa5b0ffe168e234377a89649860c38114b848dcc286341bfa8f39c3f78e

          SHA512

          e458762c59d0f7f7967a7863b80b8af9e33fdf3f0906dd7f42046e33672208166e37126b02f2a00f0a93f586f9f5e9ea7d308cc687dd1badc517e35b4f1fae7e

        • memory/2388-0-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2388-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2388-7-0x00000000001E0000-0x0000000000213000-memory.dmp

          Filesize

          204KB

        • memory/2388-15-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2588-17-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2588-18-0x0000000000140000-0x0000000000173000-memory.dmp

          Filesize

          204KB

        • memory/2588-24-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2588-29-0x00000000001B0000-0x00000000001CB000-memory.dmp

          Filesize

          108KB

        • memory/2588-30-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB