Analysis

  • max time kernel
    24s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 23:33

General

  • Target

    8728f416cc909f393523406851f6aac0N.exe

  • Size

    7.8MB

  • MD5

    8728f416cc909f393523406851f6aac0

  • SHA1

    1cbec0a89eba1b128c3b50dd3fed9a1ff0a61b46

  • SHA256

    f6f157d8f0d93052dc8cb8152bbf42c1d88316f3a1f55a02d25d6daf0a09a960

  • SHA512

    00aa80fad809263e79221135b4d0edea4240dc1fb8e4e1d0bd4b23704696bab27bc8ab6cee7613f5a43f1d8d74cfb900bcd9a14be42e7f4b30fa1a57e0eaf67d

  • SSDEEP

    98304:emhd1Urye5/WkimUy4MK6vu6/UV7wQqZUha5jtSyZIUb:elJPimf4SW6/U2QbaZtli

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\6FE3.tmp
      "C:\Users\Admin\AppData\Local\Temp\6FE3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8728f416cc909f393523406851f6aac0N.exe EAF91AC7EDE7BA806A37DB68CE4F815366BB910825677D01736F4548F70BC3941DFBBEE2CC312D6CBAC3FB4C3D6F18D6D40C7FCAA227B501D0EA5CD46C91D42F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\6FE3.tmp

    Filesize

    7.8MB

    MD5

    8f5df83cf0a1743d3206efba7be8355f

    SHA1

    62691ca7c239367c1f23a6218acbe74aebe9726b

    SHA256

    9696532d8c711130a87c22bdb23b40b5d78d29afd6673febb8eebc4d96f8e4ec

    SHA512

    0192b4cc3f9991cc190f1d75f17cd9089ac26f41630c192fd7ba39ae18a5b35443c59062a928e6a43fc4a8f4cdeaac6df8deb609a928c4c8e88e84219ddca654

  • memory/2732-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/3028-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB