Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 03:11

General

  • Target

    7601b027e06487affea8765d71ec8a90N.exe

  • Size

    4.4MB

  • MD5

    7601b027e06487affea8765d71ec8a90

  • SHA1

    18c052699cc667eba0f87d82b77bdd2819272c3b

  • SHA256

    ad237937b5fc003c6fae03a171755cf1b26aac7f727dbb5a8b1b0414f1ac5522

  • SHA512

    49b1526e33245515d2a516be9eca4d39aaf845a051a2cab972cdcaa315b035a1e343d957165ff28e47318590c2a3470d99b1c19af2317819772afdf68587271f

  • SSDEEP

    98304:emhd1Uryeiw7lj+YIpABV7wQqZUha5jtSn:ell7ljK62QbaZte

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7601b027e06487affea8765d71ec8a90N.exe
    "C:\Users\Admin\AppData\Local\Temp\7601b027e06487affea8765d71ec8a90N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\C60F.tmp
      "C:\Users\Admin\AppData\Local\Temp\C60F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7601b027e06487affea8765d71ec8a90N.exe 4E45E1FA6C42D995A508AC41001CAECA525D88838FEF2753AE0F35DFC39B194E311E7703F7ED4DBB1A1B201DBF5547552E7F5DB9C8CCD961BA482D636CCCA003
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C60F.tmp

    Filesize

    4.4MB

    MD5

    f25c837bed2b80174bbb407ec938b432

    SHA1

    d06886d7cbe222de898fcd9fac81608c8aea7c96

    SHA256

    ecca09aabeb1e3b3fbeafe1cd56838045de0ecc0917ee86b588d050e3d190004

    SHA512

    e827d38b43172b45db559bdac93885af4b2c86e9e717c96c0b45c7211c3b756d55a180242aebdacae3512180a786ee677fa782eca3a046827b706ae750ae064f

  • memory/3776-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/4156-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB