Analysis

  • max time kernel
    111s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 06:12

General

  • Target

    ebe7b611bcbfc6f79e297473950d9d20N.exe

  • Size

    88KB

  • MD5

    ebe7b611bcbfc6f79e297473950d9d20

  • SHA1

    cf8f6bbb9d278ce550934689607e2530a83ff605

  • SHA256

    d22861f1847759ad6c0a6d13ecc772cef4c12867123e4e0b6e1be480fc165775

  • SHA512

    9870fdbc67612032997fb065dbdf14093aff2589f766329b0b57da694c3361e94444bc0f55fb9ad0cd6f06e61680d5abe7095bbe84b6444714fec8166c8088d0

  • SSDEEP

    1536:zeIb/GntmGcF7LVBReqx+476rVdQdpaUjmHo21yYD3H6rFgY893sLBqAOgShVKnW:zec/LGcFVsKdpaUi7yYDX6zJS5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebe7b611bcbfc6f79e297473950d9d20N.exe
    "C:\Users\Admin\AppData\Local\Temp\ebe7b611bcbfc6f79e297473950d9d20N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\yaxkodila.exe
      C:\Users\Admin\AppData\Local\Temp\yaxkodila.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\yaxkodila.exe

    Filesize

    88KB

    MD5

    75e3a51ebdf4f4c66a46ceb0501edccb

    SHA1

    33427a041b12a64c503eda82116d84647e5516ef

    SHA256

    7c6d42684a611142fd3f6879e1624ea42b33b9ffe5cfae0dc610da6d82722af7

    SHA512

    7f162b1b53187c690a0590da3bdf25806bf26ca3feb6e0ed5902c0bbe66da14c8b84ac34294b1b1b44026aa85922802a31566af64fc2bfdb15a2ce27cda4f2cf

  • memory/3568-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/3568-1-0x0000000000415000-0x0000000000417000-memory.dmp

    Filesize

    8KB

  • memory/3568-7-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4124-8-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB