Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 01:19

General

  • Target

    7e8032eae1d0ada9db00520343ff29a0N.exe

  • Size

    15KB

  • MD5

    7e8032eae1d0ada9db00520343ff29a0

  • SHA1

    4fa64c62b8fa0404b8c4494ea8235598377c50c6

  • SHA256

    672235a135c2d993f6285e92071185249b55044b18c16d2dd6db4ef79321ea8f

  • SHA512

    7ba2f750c57d7db396ddb324e88e5cb5060332f241e268ab1fe70532b621dbdeb5c29a25ba4b65ef7742501bd9fdbce038a0f5abdd2a25f8d5845f378de8974e

  • SSDEEP

    192:lHFwFITsYHSYHhL3k5t4dLpxuG/rowBM0UxfpzTC7NPAX:llwFITlhY5qdCQrowBMTfpoVo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e8032eae1d0ada9db00520343ff29a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e8032eae1d0ada9db00520343ff29a0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe
      "C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\kgfdfjdk.exe

    Filesize

    15KB

    MD5

    358153d07956f5f231b9b73d7414cdef

    SHA1

    30be4617856bbef83f94fcfb953c91be8bbeb52b

    SHA256

    3bf619a2285ec90f846504df5528fc05ee6dfb127f76ec4a01c284c35ba91060

    SHA512

    25c1b43c6e6075e4a91f63becacefdd847ed85b51cf4dcb3784885173b7f797429969bb3e08374b054608b2c311645437af15432c2bb5da35863230414002076