Analysis

  • max time kernel
    102s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 06:30

General

  • Target

    47cd1b855b4d3c5230cfa7c66d3e3090N.exe

  • Size

    256KB

  • MD5

    47cd1b855b4d3c5230cfa7c66d3e3090

  • SHA1

    d897279a1328d1821e68a1813569d87f1fd448fe

  • SHA256

    947d7a17648e67106924a2ff81bed6248124ef5487bf0c559f11ac19d05459e4

  • SHA512

    0ef940dcf28352003b87511a2e1686f4dbc5af5ea7bb17e35ca5812fab9313e141eded585a68c8b9d7030cbe290a0a08122b0afa8af9852ee12109c1481ad5a4

  • SSDEEP

    6144:GakhAv5Icf4SFFRQSXFxPq379H0W7cyqCxSng7:hkoI1qScFi7j0nk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe
    "C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe
      C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\47cd1b855b4d3c5230cfa7c66d3e3090N.exe

    Filesize

    256KB

    MD5

    7d1c8aff3904f5b38f17776424aaccaa

    SHA1

    6118570b184184ee6e9ea61c8bb549db65106cbd

    SHA256

    27a2348964bbc4b39b9dfeba4a29a35d3a1d9c4691b2779bca2013a8e3106729

    SHA512

    31883ce94c9aaec4c7822ae6a2f625d2d5ef9cb33bcc0508027d22a56706f557341d6be1dbddbb9101b1181238cd4526623e00b4fd60f3b16cef5691840aadb9

  • memory/2148-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2148-8-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2212-10-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2212-16-0x0000000000130000-0x0000000000171000-memory.dmp

    Filesize

    260KB

  • memory/2212-11-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2212-17-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB