Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 01:14

General

  • Target

    2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe

  • Size

    3.2MB

  • MD5

    aee4dd798da9f13ac44fcd2eb5b6b296

  • SHA1

    7079918f2ae966e78f7f234c088ce1feb7db00b9

  • SHA256

    2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166

  • SHA512

    95b6d31aa2ce2e9a58a23568f9e4cfd5fd13fe4e23bd71fb1218a45c17b0a273d8ac546414beb022f4386ffaacc34591d8a0b12c0e287197a5b52fbeea345a5b

  • SSDEEP

    98304:KkLLYuywfUx3Dbmy9DwvXlIfYjpo0Njo8:FL5GbmyuXlIApokjL

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe
    "C:\Users\Admin\AppData\Local\Temp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Users\Admin\AppData\Local\Temp\is-LKDG9.tmp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-LKDG9.tmp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp" /SL5="$50264,2487297,845312,C:\Users\Admin\AppData\Local\Temp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-LKDG9.tmp\2952264b226a7f252a4195087e104e326cb2d70ae0ffb526c5051006059b0166.tmp

          Filesize

          3.0MB

          MD5

          0d041f22d598f3a63bdf0e66c448bdab

          SHA1

          591fc72ec32e7efe2e641dba38c3cd7b6d415450

          SHA256

          e6b54015c403e3016b848b18fc488d4d281a752bc9ab2a3324ba4d8efb642563

          SHA512

          5dd3af37f06f308f348213c0305acab38cf279556c12a9b14d0343072b1f431778c75129715a2b04abcf219baaeba665faa08fcb4692d2ede36b2511178de210

        • C:\Users\Admin\AppData\Local\Temp\is-M1B8S.tmp\idp.dll

          Filesize

          2.6MB

          MD5

          347530853fd2439ce98bd9a4faf643a0

          SHA1

          5becda68c81b692a7352840a8d8841023cba7e93

          SHA256

          6280e78986521f8662e1408d7cfe3bab343aa043e4fa15c8fe9b424306b194d9

          SHA512

          d9be9bfe254d4c7297034d481ce6144d85a0a5c9cdf20c7d6906ea2091239ab39d26b9d7b651a750a16cbb7d984a0ffdf69027d97a6dc8bcca1a2fa162b88dfe

        • C:\Users\Admin\AppData\Local\Temp\is-M1B8S.tmp\mentor-inno-lib.dll

          Filesize

          283KB

          MD5

          b53e08b82850626c046a5cebd295e41c

          SHA1

          086cbe08eba3fdc68371f46ee29e6dbeaa5d6876

          SHA256

          5120508b7cbdee3d9c89c8ece6e95c9bee018c4e09f13d5e0e2f7cf99828d0c6

          SHA512

          d76ae06d131450b5590e1c816615ad0b7bacfd648e34a69340c2c68c498d0670e3384dfa4d258064f66f590c512fdc5fddabfb55776fb729ab51c0cbfd4050be

        • memory/3220-0-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3220-2-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB

        • memory/3220-19-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3336-6-0x0000000000400000-0x0000000000717000-memory.dmp

          Filesize

          3.1MB

        • memory/3336-13-0x00000000024A0000-0x00000000025E0000-memory.dmp

          Filesize

          1.2MB

        • memory/3336-14-0x00000000024A0000-0x00000000025E0000-memory.dmp

          Filesize

          1.2MB

        • memory/3336-21-0x0000000000400000-0x0000000000717000-memory.dmp

          Filesize

          3.1MB