Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 02:59

General

  • Target

    d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe

  • Size

    1.9MB

  • MD5

    4b3adcfdfd8ca94638c5e35457a78391

  • SHA1

    c3724620dd9c44e55a84462384b7716c3e479caf

  • SHA256

    d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa

  • SHA512

    fc6377b682b59765e8b728c47387fdca8421acf08ec601984a1b37d6976b80fef73c93bd3026cf72e47426168cefca75f43d52e310553fb6d7d7e34004b1e6ac

  • SSDEEP

    49152:Qoa1taC070dZxaNtDakSVjW1BxxuYb4wZ4Mvk+3d5DO:Qoa1taC0Ca3jS1AH8Mv53nDO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
    "C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\9721.tmp
      "C:\Users\Admin\AppData\Local\Temp\9721.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe B368CD824FFAF35EA376E14B1152B331CD3583BCF6A1ADD30252C5F06875F2CC1604E4F96C592D6F7B3F2064FEBC7F9DF6E5502FF25E4FC198FE52411A98B93F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9721.tmp

    Filesize

    1.9MB

    MD5

    f967caa91e95ec63e59224797755d85e

    SHA1

    fd9b2f9fdc9d929e8ae1370299057848965ed7c2

    SHA256

    b5fb4a5f10a84dcbaf86018ccc58dd0b258a41595bd79ca0532d62ed3430bb2c

    SHA512

    d42b201c0bed4c58074747818e5f8c4e9dc5a0e21d57ce5431143ea84da02590a0bf98c76f05a4ffe1f71aa9c8fe818dd39ca10517bd4d288e476d2d43b9f3ff

  • memory/2124-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2340-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB