Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 12:42

General

  • Target

    $PLUGINSDIR/Downloader.exe

  • Size

    64KB

  • MD5

    620db192960aa0254e628116cc2e481e

  • SHA1

    7e876192b000dbf373f7c7c31857c0d624b004e9

  • SHA256

    b3c4703b758f550eeaad7600f1ecc5967bf5272a98e6252ddf9e88034b937015

  • SHA512

    59dc894920db6e770bb46d4cef587f869220a4ea72ac198e9f4681cb05d1941510d01fb409fc1247ab18a8e57e8c850b7a10e989fa2ce10f2a928aa7ad98ab31

  • SSDEEP

    1536:Qf4exGDkeZ4mOoSgJEAJJ/4Romu/BpiUoBp5WYaT/dc9:u4eYZ4+1JXJJ/45C2BDCdE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Downloader.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Downloader.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsz9C12.tmp\System.dll

    Filesize

    10KB

    MD5

    2b54369538b0fb45e1bb9f49f71ce2db

    SHA1

    c20df42fda5854329e23826ba8f2015f506f7b92

    SHA256

    761dcdf12f41d119f49dbdca9bcab3928bbdfd8edd67e314d54689811f9d3e2f

    SHA512

    25e4898e3c082632dfd493756c4cc017decbef43ffa0b68f36d037841a33f2a1721f30314a85597ac30c7ecc99b7257ea43f3a903744179578a9c65fcf57a8b7