Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 02:59

General

  • Target

    d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe

  • Size

    1.9MB

  • MD5

    4b3adcfdfd8ca94638c5e35457a78391

  • SHA1

    c3724620dd9c44e55a84462384b7716c3e479caf

  • SHA256

    d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa

  • SHA512

    fc6377b682b59765e8b728c47387fdca8421acf08ec601984a1b37d6976b80fef73c93bd3026cf72e47426168cefca75f43d52e310553fb6d7d7e34004b1e6ac

  • SSDEEP

    49152:Qoa1taC070dZxaNtDakSVjW1BxxuYb4wZ4Mvk+3d5DO:Qoa1taC0Ca3jS1AH8Mv53nDO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe
    "C:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\7E19.tmp
      "C:\Users\Admin\AppData\Local\Temp\7E19.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d8f39595ef382d5e7c38f131fb4a936119211f91a2e3916e49720f1af0cd1caa.exe 662094A03DE771F2F80F472197A5B7F179C9049D7117DA2E0E78F248EDFD605BA5D499C098D6036D3D518712BE2B594FFEFAEBD179B623B25657FDA5DBD38B09
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7E19.tmp

    Filesize

    1.9MB

    MD5

    390cfc1b3f4e964c428c95a911bdc64b

    SHA1

    e6f0df23ccf84bfc0a4142f23180e28d02c64369

    SHA256

    985ea416613e9f8ec1b7e347ad64c6b10bdce2422d40354e25e8566de8cb6131

    SHA512

    f000192b16a785523e908fc86e7be506e52ecdbe181e6cfdbc4199a961817f869262e76a626841af8e8107cc3566aa3c78026452a519563b7cfddae75d74f032

  • memory/2056-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2256-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB