Analysis

  • max time kernel
    101s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 01:56

General

  • Target

    43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe

  • Size

    4.2MB

  • MD5

    43bd88cb4e6c6aeaa8a6bd73d9e0f830

  • SHA1

    7480d1e7662d1d979895e1e043fc0f419a0d29c5

  • SHA256

    7fc93f874751d474edb03be0912d574a5fb53092f5b8504052861fde4a10573a

  • SHA512

    841d3156783ab04d989628b6eefe19af6773eeb3d966b07ef69bef05781d63f09e91ae6954474a138bc0947f784eb5902a31f3ee86cac4ce777a9cd65d3b5498

  • SSDEEP

    98304:Cmhd1UryegwMHwab4PErS8qVLUjH5oxFbxhVLUjH5oxFbx:ClzYDSTVUjZEdhVUjZEd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe
    "C:\Users\Admin\AppData\Local\Temp\43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\7ED5.tmp
      "C:\Users\Admin\AppData\Local\Temp\7ED5.tmp" --splashC:\Users\Admin\AppData\Local\Temp\43bd88cb4e6c6aeaa8a6bd73d9e0f830N.exe C3D7437D2C50A3E22DF30084EBA7B6820DC9631389D122326B9F73DF2DD5295DF98404AC65CB7BAEF90B226173DBAF19D2387F0A2C4896D58544BE75CDD4CE2A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7ED5.tmp

    Filesize

    4.2MB

    MD5

    71ab0fe3bb4084e40caf8c3b9112ef54

    SHA1

    5f22cbd513011842734e3e01e6c7f21e13a77553

    SHA256

    1c9801be9bf0f5ad6d71f8e35fa27142bf3654952bf77eb3ae8881f9ca4a9062

    SHA512

    f8e7a31fd300ece7237de0ed93f373e6ad6df88da8390647b09552ce6ec2e0721acc81cebfca6ba8c47616f08a42bfec3b841d1f7ffd8e03d4b9209807230d3c

  • memory/2184-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/4032-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB