Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 12:44

General

  • Target

    2840c8fa8a4e14faf99976fc8dcfb770N.exe

  • Size

    32KB

  • MD5

    2840c8fa8a4e14faf99976fc8dcfb770

  • SHA1

    0ea88c77da44462efc157c8a524bb3ce6b37879c

  • SHA256

    b170f80f04e9eb364f7f0a33a9e95de4bb4f27cca155e31eadf21ed9e2ddb246

  • SHA512

    16c8ea5ef93d5336fb479580625eede25ff2c02d23d3286ed421dce6749c0f65d0fc9fc965496fa0f68d0a1635226f5a5a0a2a55a6495e0ff21b2503f9b5c99c

  • SSDEEP

    768:6B7HBXFw82t2C80lyaZ4jX05RfX5XciJr480tcW:u7HZFwzlyaZTSi+80tcW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2840c8fa8a4e14faf99976fc8dcfb770N.exe
    "C:\Users\Admin\AppData\Local\Temp\2840c8fa8a4e14faf99976fc8dcfb770N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\cnwog.exe
      "C:\Users\Admin\AppData\Local\Temp\cnwog.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cnwog.exe

    Filesize

    32KB

    MD5

    ddd68e9289fa23c9d647776119f3aac9

    SHA1

    e423d478f05255a78a68376f74ceabc7aeb6a742

    SHA256

    6258f1ea7cb36d415161ea81a1f20069b4a0b7477b7874ec593ea6101c9a7e20

    SHA512

    60a9a105d8250392b62ed30bc10e573e41473c059c203c661ede53e4926285f07b8b481082d081a24e79b2a22607f417478760a3495075173003e8bf3e753c68

  • memory/2760-8-0x0000000000100000-0x0000000000103000-memory.dmp

    Filesize

    12KB

  • memory/3024-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB