Analysis

  • max time kernel
    115s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 21:19

General

  • Target

    f8da2b84e4057988b2cfed87b870ded0N.exe

  • Size

    461KB

  • MD5

    f8da2b84e4057988b2cfed87b870ded0

  • SHA1

    a470567be7d748fac4b3ee0fa19a71a9648bbb8d

  • SHA256

    ac0874f5afb9eb518f7e1072f8d0e7e815f19614eb9ad499df737d832e609b9a

  • SHA512

    0898b2aea9b854b066b9e8b251ccf7f3aabf6aa699c6a3b27f1fe3ed29e79ed9072e63c75d729e5cc8604e319ba3c757b09ade8dc3ed5b6c47ceff1e38f69342

  • SSDEEP

    12288:jsTh3cnvEFdTk4FF1g38Hx1iCJXOyC1aNJjrlIpGPyF:jsl3c0dTk4rH1fiaNhRIpGPyF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8da2b84e4057988b2cfed87b870ded0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f8da2b84e4057988b2cfed87b870ded0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\mf.exe
      C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4548
    • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\ef.exe
      C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll" -111
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1232
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
    1⤵
      PID:376

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\BaseConvert.dll

            Filesize

            48KB

            MD5

            d0419b6814f1b8e12b7b70616fedd0c7

            SHA1

            ef5fcbc2fa3623be8cf82def59a696bf946777ec

            SHA256

            14a4c7d96d87cb23038d688e80919d727f0cdb3b51859115f14c0af3248f109c

            SHA512

            d95cf9e3ef07154c83d26d9c57e3d7096f9cd8700aadf72c2e6b33264e46cd6314e072e9f11529431d484d4856f64c611b07c7bbd2bdb197ff593743a1ce1a34

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\Dialer.dll

            Filesize

            3KB

            MD5

            068ba6a2cece65f680895ea627f71e39

            SHA1

            27070d0fa949a80360426f37b3dfe9eaa0ed66f4

            SHA256

            ef649d2b3daed72b0778ab6b3f22a02e288fd009cf9e7e76eb1991451e580f82

            SHA512

            adf99b31790694d8ad02c56b1cb7c9dadeac49d492225a2d297654bfcd617f3afad23990d1d695fba03af1c355456e2e7c3e972eaa9b5ab1770bbb6eef0e733f

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\GetVersion.dll

            Filesize

            9KB

            MD5

            225f776172f1baccd2721a6e5d512b36

            SHA1

            2dbbc86f7b0285682880a627b56a75de09f4bed6

            SHA256

            ecfcbe30f5b248673f9cbebb734b9981ed14b06380ea787c563d67b30e2d069e

            SHA512

            4b99a5ac68122501a5913cf54bd3ae99d851d57656b0e136980122739cceef739fa2d5ea097f2442068b9489a4c25ea0884653c41d85f27f25996792bf6c21bb

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\Math.dll

            Filesize

            66KB

            MD5

            b140459077c7c39be4bef249c2f84535

            SHA1

            c56498241c2ddafb01961596da16d08d1b11cd35

            SHA256

            0598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67

            SHA512

            fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\ef.exe

            Filesize

            2KB

            MD5

            b8a00d99534bf83442b20b2474b767cf

            SHA1

            505d3f6591db0f87a73a0ac820cc2eba5171cfff

            SHA256

            cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6

            SHA512

            75df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out

            Filesize

            19KB

            MD5

            e93d89074477fec8889ebac9d62b5c39

            SHA1

            efd9720cbfaad9422a7861df1de9a62ade2f01ab

            SHA256

            5d4a0d7b0ffc7c66ed1c82f9a1113171144ce8b4e13b1d32a63633b903681e7f

            SHA512

            e6b208739e9a3c555b7a652a05950e375732352ace80454b50d6f9fd7d39942827ef4c86ed8e707361b299d7a0eaccf368be50eb337739da956537242072f488

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out

            Filesize

            19KB

            MD5

            63cba29ea4625660c23cad9e922989f5

            SHA1

            54d6113a68222084ffec8e767a755c2d645b26c1

            SHA256

            a2a76f7920005aa914877f2d7e7674e871b4884e17bf34fdf70471bc8fecd1f0

            SHA512

            6dea4fede42dd70c07ebc77ad447b83a05083a9086c79ebacd20740a0924dab2f744c6f5da991ff507a345e24f6565f4a5242a533ae669d7fd308868868de653

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out0

            Filesize

            9KB

            MD5

            9e58ede648d8d1440df0837ed5876e4d

            SHA1

            0752f706596d3fc29efab8b08ebe68dd45ad8d76

            SHA256

            9587850fc6e0cfee023d884e69418219f00726d6d4b029f7d1172d85ec3bae0a

            SHA512

            35222bf5fa64828dfccd4676d6d17c2e3e9f8707e9d2edfb1dde2bb0ac5e0d8cd0f13c4fc5130a8701c1456c1fd0efad2bc5f139f80961f897d585eb1de5ec83

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\inetc.dll.out1

            Filesize

            9KB

            MD5

            189f6fe10648792200f5ba64343274a7

            SHA1

            5bb1c9d0b4eee3c64daff88707773f78b60be527

            SHA256

            3f13b20ce35f5893a03f2a823ad4287e52932dedd0a7a23c6f57384f43d583d9

            SHA512

            dda2f0a9376018c3a64340a1996395d4b86ef519cfc60a1a1f641376119662f969ede0155d47c78789a69520842a888eec0ba67fc94fe3e62e2fc8a914f15088

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\mf.exe

            Filesize

            2KB

            MD5

            224df7127c7ee69e67380eefc983a6ff

            SHA1

            236c342c5bd1f71725534d097fcd8538dd95aa56

            SHA256

            9ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965

            SHA512

            c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f

          • C:\Users\Admin\AppData\Local\Temp\nsp2BDE.tmp\nsExec.dll

            Filesize

            6KB

            MD5

            acc2b699edfea5bf5aae45aba3a41e96

            SHA1

            d2accf4d494e43ceb2cff69abe4dd17147d29cc2

            SHA256

            168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

            SHA512

            e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

          • memory/3436-36-0x0000000003A70000-0x0000000003A7C000-memory.dmp

            Filesize

            48KB

          • memory/3436-44-0x0000000003A80000-0x0000000003A9A000-memory.dmp

            Filesize

            104KB