Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 00:44

General

  • Target

    398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.exe

  • Size

    5.9MB

  • MD5

    0c3a67fcbdecfe690a3648233329c9c0

  • SHA1

    31073dbc3da86773f3129b7ebae3141a3774e652

  • SHA256

    398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e

  • SHA512

    86d2be8150f3dbdbd22c54b9e157cc6fe7aaad20fce24cd571fe597bdd70bee44f17e7e05129e2803e89a797723afbf897ebc819d048dd7ad09aa35c404b09d9

  • SSDEEP

    98304:3wREgX4z4K1y7rfQOiEJrk9/rW95P20ZjSYbCvnQ/iRLm0rQlKf+gyai3vsX:FK4z4uy7sBabP20ZjmnQCRrQlKf53QsX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.exe
    "C:\Users\Admin\AppData\Local\Temp\398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\is-24TL9.tmp\398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-24TL9.tmp\398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.tmp" /SL5="$50150,5167811,857600,C:\Users\Admin\AppData\Local\Temp\398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-24TL9.tmp\398c12e2d85a328375a7e82ac55ae760fddfebce8141b40b1e8d2a688b7a935e.tmp

          Filesize

          3.2MB

          MD5

          add954216b0bf975965383e02caa332b

          SHA1

          bd3c7d849f1e0897a43a7caef2311777767fa9fa

          SHA256

          d9909d33620ca9bd0d88ae5edab9dde1de85cd8858e8f059116debd88438617b

          SHA512

          3e3b94a7b310b98061be095537dc59200d90d17e053c3ff07f229bff87f5a23594c97a17aecfb887987e94d3eceab4e276299cfe7232cc79b2b227710831f79e

        • memory/2108-8-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/2108-12-0x0000000000100000-0x0000000000101000-memory.dmp

          Filesize

          4KB

        • memory/2108-11-0x0000000000250000-0x000000000058F000-memory.dmp

          Filesize

          3.2MB

        • memory/3012-2-0x0000000000D51000-0x0000000000DF9000-memory.dmp

          Filesize

          672KB

        • memory/3012-0-0x0000000000D50000-0x0000000000E2F000-memory.dmp

          Filesize

          892KB

        • memory/3012-10-0x0000000000D50000-0x0000000000E2F000-memory.dmp

          Filesize

          892KB