Analysis

  • max time kernel
    139s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 19:34

General

  • Target

    GeoWin-DTM-2024150-3-64bit.exe

  • Size

    55.0MB

  • MD5

    3e8d8b58b7acf68334fa60dddbcb53d0

  • SHA1

    58e60cc0f248581139a6cf2950455269d37d65fd

  • SHA256

    2fb9b790cb8ae6140789dc3925bb54ea468a4e7b704a0768527c236c78045040

  • SHA512

    6ea874aedbb59065296d73381bac8d077697ea1350b6e6c3cf8dc11d1c05bf8be2614503101b9aecf6855ddb7401ce8c34e8b378a4cb809511b1cd6f856001fc

  • SSDEEP

    1572864:NzwGTA3KugaxLaZAFG651yyT2W10REv5i2t7Pvqi:N0GU6ugataZM5NTJ5i25Pvqi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GeoWin-DTM-2024150-3-64bit.exe
    "C:\Users\Admin\AppData\Local\Temp\GeoWin-DTM-2024150-3-64bit.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\is-U1PJB.tmp\GeoWin-DTM-2024150-3-64bit.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-U1PJB.tmp\GeoWin-DTM-2024150-3-64bit.tmp" /SL5="$150052,56723908,845824,C:\Users\Admin\AppData\Local\Temp\GeoWin-DTM-2024150-3-64bit.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-U1PJB.tmp\GeoWin-DTM-2024150-3-64bit.tmp

    Filesize

    3.2MB

    MD5

    100af49b3ac084b07037984dbc57afd1

    SHA1

    eb8a7ae7019dd05f096ed4a129c51d86eb5640e7

    SHA256

    ba29b894d5b47c73bbdfd431e0fcf68e48b2d6c303a79ced5c3f86921171007a

    SHA512

    367bab690d4361c556d4135527901d49c690acc8047a09b2f1087776976faf80ef4a496a73a66f129faac94d55f8ce2fcf9d2523cedb50ea7a0a549cbbcfcc15

  • memory/392-6-0x0000000002D80000-0x0000000002D81000-memory.dmp

    Filesize

    4KB

  • memory/392-9-0x0000000000A10000-0x0000000000D53000-memory.dmp

    Filesize

    3.3MB

  • memory/1068-0-0x0000000000630000-0x000000000070C000-memory.dmp

    Filesize

    880KB

  • memory/1068-2-0x0000000000631000-0x00000000006D9000-memory.dmp

    Filesize

    672KB

  • memory/1068-11-0x0000000000630000-0x000000000070C000-memory.dmp

    Filesize

    880KB