Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 18:13

General

  • Target

    315aee617983b64ac6b5d31874fa5eb0N.exe

  • Size

    1.4MB

  • MD5

    315aee617983b64ac6b5d31874fa5eb0

  • SHA1

    485de6a81636079a878f5220bd276b5ebaf39676

  • SHA256

    721665ad995139e33398aab93ef21263694171387c41f024b49bc677a330f2fb

  • SHA512

    dacd58ba8c75aaa116039cce0ff808af31eba442db8f79fdededfc79970c30121afb0bffc3bfb8274c5b4c26e545dc150875e1e93df2f135b25e735b7fce8554

  • SSDEEP

    24576:Tax/PfhELIP50nguWxLZmN1DUZmSordfq6Ph2kkkkK4kXkkkkkkkkhLX3ax:Tax/P5ELE0ngb9ZmXYZmSadfqkbax

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\315aee617983b64ac6b5d31874fa5eb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\315aee617983b64ac6b5d31874fa5eb0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\E81E.tmp
      "C:\Users\Admin\AppData\Local\Temp\E81E.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E81E.tmp

    Filesize

    1.4MB

    MD5

    70796a0d0a9d12ec3d413856c93af1cc

    SHA1

    e81a018759aea0469b9661c374bcbbcda22a5565

    SHA256

    d5b33a464d50b00cc6f80649f33c7b8f2cde8d134cd6411927d5f4f3bf7bd9f2

    SHA512

    14363895fd569c96d0000093ab9d9628095b09081cdd11eea81cdd77787f4bd05f4cb4826e964f054f0bbfec38874a5388d2cb697d387a2a7ea0016f320e347f