Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 15:51

General

  • Target

    ab22d8d254984bdd20b447dea319113714ecdf21e2785261bb445c0714859baf.exe

  • Size

    1.9MB

  • MD5

    a67b6e7fabf322ac03269add6e6c55e4

  • SHA1

    05635285c267070b48b00ab7a62bf3365e754dbc

  • SHA256

    ab22d8d254984bdd20b447dea319113714ecdf21e2785261bb445c0714859baf

  • SHA512

    6e0bb42fe3e52a1b45e076babf6450dade713d1aa04e3a6ad1e3959531bcaa33a70203873e0f1f1b4761257ce68e43c3e0badfd6bf79a8d73d372f58095df2ce

  • SSDEEP

    49152:Qoa1taC070d6nQuCtlv/CzEUTn24TQd3bUWPTlFl:Qoa1taC0utl3Cr2EQd3Q2Pl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab22d8d254984bdd20b447dea319113714ecdf21e2785261bb445c0714859baf.exe
    "C:\Users\Admin\AppData\Local\Temp\ab22d8d254984bdd20b447dea319113714ecdf21e2785261bb445c0714859baf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3344
    • C:\Users\Admin\AppData\Local\Temp\9B07.tmp
      "C:\Users\Admin\AppData\Local\Temp\9B07.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ab22d8d254984bdd20b447dea319113714ecdf21e2785261bb445c0714859baf.exe C4F673909D90368033E6558F03DF8461BD94656173F303BA26002CD2011976881EE61B9EAA410403234943B051958B3F544E3D23BDD3248B16E1F9E1840A8EE5
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9B07.tmp

    Filesize

    1.9MB

    MD5

    c9b8decaba6c2d8e525111f13473a381

    SHA1

    f745604e96df53185153ba57eedee2aa2f39c4e0

    SHA256

    76daa86c92a1c2ec4f4f0a84a45e097b1d4baf6279455ab5dc672ed0973cc31d

    SHA512

    1ed79e95ef0744b28a710211ae52a55bf68e1550ee1331f5f2532ccda7b88fd6d52381259a86da61c52039b1e2178021cee52940bc2f58096e77bd72f3f63333

  • memory/3108-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3344-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB