Analysis

  • max time kernel
    80s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 08:59

General

  • Target

    85053f7601cc6c771f58bba412d02130N.exe

  • Size

    944KB

  • MD5

    85053f7601cc6c771f58bba412d02130

  • SHA1

    ec61411a5068f72c758da6b851eb3065d2b89bdb

  • SHA256

    b9993d2d234cd079fe2bdaf7ca86d11da7b0bdad8dfc4bc4662f62812deda91d

  • SHA512

    4f43820da5a27afa9279c4be404d253e571aee2e99bf2a0e899d78f4a36eca7b05deb8c9c8271ed6542022779424a2b22b797db77637ef5850bea58bc87eca54

  • SSDEEP

    12288:qGxsOwRHG9vA9EzAMPxbmSe9jVDa/ZSZD:xxsxo9u0AE4Da/ZSZD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85053f7601cc6c771f58bba412d02130N.exe
    "C:\Users\Admin\AppData\Local\Temp\85053f7601cc6c771f58bba412d02130N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\85053f7601cc6c771f58bba412d02130N.exe
      C:\Users\Admin\AppData\Local\Temp\85053f7601cc6c771f58bba412d02130N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 144
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\85053f7601cc6c771f58bba412d02130N.exe

    Filesize

    944KB

    MD5

    036f84419624e986305eb655f8e6d012

    SHA1

    8dcc1007482fb6a4e20810ca768d18669351111a

    SHA256

    6640ac120a781a97ed2bf9fca58fe7bb73827e18bb572dfb944b89805d28a20d

    SHA512

    4a6fa132f006ceaec4e635d450cfd753a609ef293b71633652f67b32143292e01e81c17112633fbbd902a560718fdb378be0ec320ef9220e1288eee6090180ff

  • memory/2224-0-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2224-9-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2224-7-0x0000000003090000-0x000000000317C000-memory.dmp

    Filesize

    944KB

  • memory/2304-10-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB

  • memory/2304-11-0x0000000002E80000-0x0000000002F6C000-memory.dmp

    Filesize

    944KB

  • memory/2304-15-0x0000000000400000-0x00000000004EC000-memory.dmp

    Filesize

    944KB