Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 23:30

General

  • Target

    829c6fba96e5e79a8ce397d391d16bc0N.exe

  • Size

    532KB

  • MD5

    829c6fba96e5e79a8ce397d391d16bc0

  • SHA1

    136985beb705d695f8a4c07af6a0dffee2814182

  • SHA256

    7743b689bcf739580cb89db9873f737319c056a4fed796147af214cbfc067611

  • SHA512

    ac306caef7b73e47bf8cc96c1121e95f724783e4e22eed94a7b63460268a28c5affab1a6bd0af29644c6345b3c85f59017654398c3c0841034642c7ebda23f4e

  • SSDEEP

    12288:KdcAIffrC9fdm7naI6EFxUKmJdhwLjGN7fn5nPm:KdpInm9fdmuSFxUJvw+Rn5Pm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\829c6fba96e5e79a8ce397d391d16bc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\829c6fba96e5e79a8ce397d391d16bc0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\9E71.tmp
      "C:\Users\Admin\AppData\Local\Temp\9E71.tmp" --pingC:\Users\Admin\AppData\Local\Temp\829c6fba96e5e79a8ce397d391d16bc0N.exe 469938AD39D57075B82D669B6C8AEF75BA66EC6B278DEB3F49B412D965107605208E08B2CD74D209BCD130F58EFF0CBBEAC9FF6340E08F34841ECC91F03F3A78
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\9E71.tmp

          Filesize

          532KB

          MD5

          7f68a6f0fb51e8853ca7cbab5d87e121

          SHA1

          ee528827c23c921d9448545133697b1eefce2c12

          SHA256

          5f669bd65cd3697cf05f4b21c7d02f97f0a6bcde6466ecd8632d29a796455664

          SHA512

          6fb5b521ca5701d4a54e2acb39c33559529819963563ed0c6fd0df0b3fc2dc1a5667a829800d6a857701c1d073255e3b28e5c212d4ee04e28b34f8eb7c9affb3