Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 04:47

General

  • Target

    5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe

  • Size

    4.2MB

  • MD5

    7bbcdf2e0aed9c52f8d8992e9d443d93

  • SHA1

    9f6fd09739b5ec6103cff9919eb62eeaf1cef75c

  • SHA256

    5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336

  • SHA512

    101f4d331101d4481f660f7b4c837e5c46cb8a52832af71b218065f20ad67e6829ef7d7def9001b0e171a628064abf845386fa802fcf20e9efb718aacb3b4148

  • SSDEEP

    98304:emhd1UryeoGq6BVChcuTdbYWVLUjH5oxFbxCVLUjH5oxFbx:elqOCh/TdbDVUjZEdCVUjZEd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe
    "C:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\A8A4.tmp
      "C:\Users\Admin\AppData\Local\Temp\A8A4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5befcda4f8adee0be3fc32f080f0b77188942ff1d9707b909e148dec61706336.exe A73767E97E178D294A7316F472A66C5386235199C38583CCC0B50BC15D8A39815E78AAE4567877E6D0709A6F07933D8860117B24952F500AC375E59087646B7C
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A8A4.tmp

    Filesize

    4.2MB

    MD5

    a5b124ae31c9efd3fe3531740f55b834

    SHA1

    6e7bd148afa17b6d1a1ca1e496b4c87fc4eb8775

    SHA256

    d287083ee88594952428a352bd7ae73efbd941410fa0cc84d579d4ddd68b8482

    SHA512

    4da7bb179d503d919efa23c3071a86a2d6600132d7ca7b223de1640b086b2f07ebb6579e869b660ebd5af8534293d10092f601a59f6f43e599c7a8472f3df29d

  • memory/1208-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/4236-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB