Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 01:09

General

  • Target

    d7d5b986273c4e7982e894ff415f38a0N.exe

  • Size

    4.4MB

  • MD5

    d7d5b986273c4e7982e894ff415f38a0

  • SHA1

    f637ea425eea10e2d766a4ed79fc24665fde2373

  • SHA256

    ea7fb87d8ab3f1ee1efcd86e2eebda68c40a608f7312ab8ef3c3ec4bf862e6a8

  • SHA512

    e132764251e55e1d61bdf488794e9716cb4f5fe1f6f6a0e8124cffd109f9420ed364f2611b0a36231b56f1a7e1f6d18b67078d866f308e4e1db4004ffc7bc625

  • SSDEEP

    98304:hEhG+LZuxPoLI4PaWOKadTAdiAwPqKTHu4Dca8khJHU:nI7SWOKD0qwPDt8KC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7d5b986273c4e7982e894ff415f38a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d7d5b986273c4e7982e894ff415f38a0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\is-Q77EH.tmp\d7d5b986273c4e7982e894ff415f38a0N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-Q77EH.tmp\d7d5b986273c4e7982e894ff415f38a0N.tmp" /SL5="$400EE,3774639,779264,C:\Users\Admin\AppData\Local\Temp\d7d5b986273c4e7982e894ff415f38a0N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-Q77EH.tmp\d7d5b986273c4e7982e894ff415f38a0N.tmp

          Filesize

          2.5MB

          MD5

          10239962d16e057304b511e4e03b5c7b

          SHA1

          533f39375d0a12685f3fc1f2e32ce49d7ad2576b

          SHA256

          a069cc3cbc8adc76d936e182bfd7ee4cb9808b4c5f7da31c5fc1c478f8a7416b

          SHA512

          0ed2633a4028dcf35fcf2ec6ca96e023ff7c99f5396910a96af9ab94d6442c9844bbe4fb0ce6e637220b3f79ebdbc056c6748b6c61428bb416cf61c4c742935e

        • memory/1016-0-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/1016-2-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB

        • memory/1016-10-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2968-8-0x0000000000400000-0x0000000000682000-memory.dmp

          Filesize

          2.5MB

        • memory/2968-12-0x0000000000400000-0x0000000000682000-memory.dmp

          Filesize

          2.5MB