Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 05:49

General

  • Target

    4536c613560f5c69d63b2a09cb69a410N.exe

  • Size

    1.1MB

  • MD5

    4536c613560f5c69d63b2a09cb69a410

  • SHA1

    fd212fb49a228be464a126f82d1c25dd07868fe8

  • SHA256

    227472e07d4ed9f784f58cf58a79e8b6f300dd45e0be93a77a372abc2a78c7d2

  • SHA512

    e2ed808a56d6c957edfa4844f2327c37bd4f5ab0674c31a679be828827a3178a509d1b48610c84061c3c939d17d4f2e8b704f31670ebb9ba8be65e39325a4f89

  • SSDEEP

    24576:REyVdiMjglOD1USbea/ZSoa/JXekh77Lv+fh:RZVvjgloegTg4khb+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe
    "C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe
      C:\Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4536c613560f5c69d63b2a09cb69a410N.exe

    Filesize

    1.1MB

    MD5

    bbd4f951c9a5dc1b438ab4fcb788df35

    SHA1

    08d3075fb3e2d504648745077768b3e608b99358

    SHA256

    f5efdfd9fdd02010d4842a9e9dbb683cf89f37fc7328e049f21cdc9d9660d9cf

    SHA512

    8d5cc0e858a49befe0815f80b34b9203488295557bc758924b045d6dffa6ac745542175b8a1a36e1bae541b2e098b81815a1b807cd84cb1c8a18676e49057d3b

  • memory/2520-0-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2520-9-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2520-6-0x0000000003180000-0x0000000003297000-memory.dmp

    Filesize

    1.1MB

  • memory/2676-10-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB

  • memory/2676-17-0x0000000002E70000-0x0000000002F87000-memory.dmp

    Filesize

    1.1MB

  • memory/2676-11-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/2676-37-0x000000000D780000-0x000000000D823000-memory.dmp

    Filesize

    652KB

  • memory/2676-31-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2676-38-0x0000000000400000-0x0000000000517000-memory.dmp

    Filesize

    1.1MB