Analysis

  • max time kernel
    115s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 21:19

General

  • Target

    f8da2b84e4057988b2cfed87b870ded0N.exe

  • Size

    461KB

  • MD5

    f8da2b84e4057988b2cfed87b870ded0

  • SHA1

    a470567be7d748fac4b3ee0fa19a71a9648bbb8d

  • SHA256

    ac0874f5afb9eb518f7e1072f8d0e7e815f19614eb9ad499df737d832e609b9a

  • SHA512

    0898b2aea9b854b066b9e8b251ccf7f3aabf6aa699c6a3b27f1fe3ed29e79ed9072e63c75d729e5cc8604e319ba3c757b09ade8dc3ed5b6c47ceff1e38f69342

  • SSDEEP

    12288:jsTh3cnvEFdTk4FF1g38Hx1iCJXOyC1aNJjrlIpGPyF:jsl3c0dTk4rH1fiaNhRIpGPyF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8da2b84e4057988b2cfed87b870ded0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f8da2b84e4057988b2cfed87b870ded0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\mf.exe
      C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4548
    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\ef.exe
      C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll" -111
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1232
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
    1⤵
      PID:376

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\BaseConvert.dll

      Filesize

      48KB

      MD5

      d0419b6814f1b8e12b7b70616fedd0c7

      SHA1

      ef5fcbc2fa3623be8cf82def59a696bf946777ec

      SHA256

      14a4c7d96d87cb23038d688e80919d727f0cdb3b51859115f14c0af3248f109c

      SHA512

      d95cf9e3ef07154c83d26d9c57e3d7096f9cd8700aadf72c2e6b33264e46cd6314e072e9f11529431d484d4856f64c611b07c7bbd2bdb197ff593743a1ce1a34

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\Dialer.dll

      Filesize

      3KB

      MD5

      068ba6a2cece65f680895ea627f71e39

      SHA1

      27070d0fa949a80360426f37b3dfe9eaa0ed66f4

      SHA256

      ef649d2b3daed72b0778ab6b3f22a02e288fd009cf9e7e76eb1991451e580f82

      SHA512

      adf99b31790694d8ad02c56b1cb7c9dadeac49d492225a2d297654bfcd617f3afad23990d1d695fba03af1c355456e2e7c3e972eaa9b5ab1770bbb6eef0e733f

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\GetVersion.dll

      Filesize

      9KB

      MD5

      225f776172f1baccd2721a6e5d512b36

      SHA1

      2dbbc86f7b0285682880a627b56a75de09f4bed6

      SHA256

      ecfcbe30f5b248673f9cbebb734b9981ed14b06380ea787c563d67b30e2d069e

      SHA512

      4b99a5ac68122501a5913cf54bd3ae99d851d57656b0e136980122739cceef739fa2d5ea097f2442068b9489a4c25ea0884653c41d85f27f25996792bf6c21bb

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\Math.dll

      Filesize

      66KB

      MD5

      b140459077c7c39be4bef249c2f84535

      SHA1

      c56498241c2ddafb01961596da16d08d1b11cd35

      SHA256

      0598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67

      SHA512

      fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\System.dll

      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\ef.exe

      Filesize

      2KB

      MD5

      b8a00d99534bf83442b20b2474b767cf

      SHA1

      505d3f6591db0f87a73a0ac820cc2eba5171cfff

      SHA256

      cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6

      SHA512

      75df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out

      Filesize

      19KB

      MD5

      e93d89074477fec8889ebac9d62b5c39

      SHA1

      efd9720cbfaad9422a7861df1de9a62ade2f01ab

      SHA256

      5d4a0d7b0ffc7c66ed1c82f9a1113171144ce8b4e13b1d32a63633b903681e7f

      SHA512

      e6b208739e9a3c555b7a652a05950e375732352ace80454b50d6f9fd7d39942827ef4c86ed8e707361b299d7a0eaccf368be50eb337739da956537242072f488

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out

      Filesize

      19KB

      MD5

      63cba29ea4625660c23cad9e922989f5

      SHA1

      54d6113a68222084ffec8e767a755c2d645b26c1

      SHA256

      a2a76f7920005aa914877f2d7e7674e871b4884e17bf34fdf70471bc8fecd1f0

      SHA512

      6dea4fede42dd70c07ebc77ad447b83a05083a9086c79ebacd20740a0924dab2f744c6f5da991ff507a345e24f6565f4a5242a533ae669d7fd308868868de653

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out0

      Filesize

      9KB

      MD5

      9e58ede648d8d1440df0837ed5876e4d

      SHA1

      0752f706596d3fc29efab8b08ebe68dd45ad8d76

      SHA256

      9587850fc6e0cfee023d884e69418219f00726d6d4b029f7d1172d85ec3bae0a

      SHA512

      35222bf5fa64828dfccd4676d6d17c2e3e9f8707e9d2edfb1dde2bb0ac5e0d8cd0f13c4fc5130a8701c1456c1fd0efad2bc5f139f80961f897d585eb1de5ec83

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out1

      Filesize

      9KB

      MD5

      189f6fe10648792200f5ba64343274a7

      SHA1

      5bb1c9d0b4eee3c64daff88707773f78b60be527

      SHA256

      3f13b20ce35f5893a03f2a823ad4287e52932dedd0a7a23c6f57384f43d583d9

      SHA512

      dda2f0a9376018c3a64340a1996395d4b86ef519cfc60a1a1f641376119662f969ede0155d47c78789a69520842a888eec0ba67fc94fe3e62e2fc8a914f15088

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\mf.exe

      Filesize

      2KB

      MD5

      224df7127c7ee69e67380eefc983a6ff

      SHA1

      236c342c5bd1f71725534d097fcd8538dd95aa56

      SHA256

      9ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965

      SHA512

      c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f

    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      acc2b699edfea5bf5aae45aba3a41e96

      SHA1

      d2accf4d494e43ceb2cff69abe4dd17147d29cc2

      SHA256

      168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

      SHA512

      e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

    • memory/3436-36-0x0000000003A70000-0x0000000003A7C000-memory.dmp

      Filesize

      48KB

    • memory/3436-44-0x0000000003A80000-0x0000000003A9A000-memory.dmp

      Filesize

      104KB