Analysis

  • max time kernel
    102s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 03:37

General

  • Target

    6a80fe0788757e718d32f5c5a7ed6a80N.exe

  • Size

    960KB

  • MD5

    6a80fe0788757e718d32f5c5a7ed6a80

  • SHA1

    390ae783a5c3e18a6c004cbc499542e0eedf0070

  • SHA256

    ffbd6372a3c5f36cca7f744e10f0e4ab0463bfd75c83216177ae752a07233e56

  • SHA512

    246a01c8b9c80ffa18548f0879f7fb357c4f7c505a4f3a8aec7f2091998c836bf3ea6639d7cc4afa64b04ca144a34f0e3a071096f57324ae90669314a7cc2b5b

  • SSDEEP

    24576:/WzXBayYbCPmDm9/jWV7C9l94amTnCODtg+U:/WzXBayYm+qo7CczDtg+U

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a80fe0788757e718d32f5c5a7ed6a80N.exe
    "C:\Users\Admin\AppData\Local\Temp\6a80fe0788757e718d32f5c5a7ed6a80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Users\Admin\AppData\Local\Temp\a20o0mO5Xi\zXZk9xum\Setup.exe
      C:\Users\Admin\AppData\Local\Temp\a20o0mO5Xi\zXZk9xum\Setup.exe --relaunch
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:1384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a20o0mO5Xi\zXZk9xum\Setup.exe

    Filesize

    960KB

    MD5

    6a80fe0788757e718d32f5c5a7ed6a80

    SHA1

    390ae783a5c3e18a6c004cbc499542e0eedf0070

    SHA256

    ffbd6372a3c5f36cca7f744e10f0e4ab0463bfd75c83216177ae752a07233e56

    SHA512

    246a01c8b9c80ffa18548f0879f7fb357c4f7c505a4f3a8aec7f2091998c836bf3ea6639d7cc4afa64b04ca144a34f0e3a071096f57324ae90669314a7cc2b5b

  • memory/1384-11-0x00000000008D1000-0x0000000000961000-memory.dmp

    Filesize

    576KB

  • memory/1384-10-0x00000000008D0000-0x00000000009CD000-memory.dmp

    Filesize

    1012KB

  • memory/1384-9-0x00000000008D0000-0x00000000009CD000-memory.dmp

    Filesize

    1012KB

  • memory/1384-8-0x00000000008D0000-0x00000000009CD000-memory.dmp

    Filesize

    1012KB

  • memory/1384-12-0x00000000008D0000-0x00000000009CD000-memory.dmp

    Filesize

    1012KB

  • memory/4360-1-0x0000000000E60000-0x0000000000F5D000-memory.dmp

    Filesize

    1012KB

  • memory/4360-2-0x0000000000E60000-0x0000000000F5D000-memory.dmp

    Filesize

    1012KB

  • memory/4360-0-0x0000000000E60000-0x0000000000F5D000-memory.dmp

    Filesize

    1012KB

  • memory/4360-3-0x0000000000E61000-0x0000000000EF1000-memory.dmp

    Filesize

    576KB

  • memory/4360-13-0x0000000000E60000-0x0000000000F5D000-memory.dmp

    Filesize

    1012KB