Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 18:14

General

  • Target

    de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe

  • Size

    496KB

  • MD5

    6835f266fad4e3571e321f8e2673fca5

  • SHA1

    a106168dba20c53f05227c755ec421349a5f57f3

  • SHA256

    de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368

  • SHA512

    806cae672150fa1b11abc10c094bd6b2d2028b91fe2293b598904eb6c65c20c0c66f834f34735f846139d16fb061425ee48991b02f0449e53fb1c2d98a37a861

  • SSDEEP

    12288:zdZMH4bP9n/nmPDxEICJxmxBa+h3tWBLks9Yy9WyULx:5ZMe9nvmtEx8BVfWBIs9JwX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe
    "C:\Users\Admin\AppData\Local\Temp\de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\E3AB.tmp
      "C:\Users\Admin\AppData\Local\Temp\E3AB.tmp" --pingC:\Users\Admin\AppData\Local\Temp\de655c42cbccea9cffbc64fe92e06132199d668397aaf234f5e40eebde79f368.exe 56AB841377B30B4AD2A6A085A5B8B9555D0263665B548521EB819BFCB02F3DE428535E36F982D8057CC313336F12B8B556E6E499DB4A83AB4425B0118175E8C3
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E3AB.tmp

    Filesize

    496KB

    MD5

    a1c2c059371da7e0553355d610246172

    SHA1

    745b640e56fe11e10ce479ef5b7f4313e62a4569

    SHA256

    7838e5019cb2ccd2926cad011884a74f06c43acd3a8f7c23f669603d25988734

    SHA512

    bcdabfda16bcc791aff8c2817a3139465e7246f455a0651a866c89574d2452490ab8a4bd90813891a0260c92f7ea812b4c18aadc1840a7f03d03fd4714523782