Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 09:54

General

  • Target

    d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe

  • Size

    1.9MB

  • MD5

    c7d723a6774e2d7e2e07935a167ea18b

  • SHA1

    9710d6b06b1ded2086dacd682fbfe3a17d079c7c

  • SHA256

    d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165

  • SHA512

    38680a351b98dc6da93830576666cafce478b729e1faee0099a20657f5876504a79074b382939b22b8d09d96af902b31a00fa7a1af686591b6382786ff55b326

  • SSDEEP

    49152:Qoa1taC070dyIwf9dFcX86ADFVqof9/GVgtko:Qoa1taC0sMtcMNqoFUS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe
    "C:\Users\Admin\AppData\Local\Temp\d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\196A.tmp
      "C:\Users\Admin\AppData\Local\Temp\196A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d54815a285e403c8918d2d0c486824fb38e205e2b1a99b443b3603a90af8b165.exe 57FC4ACE75F0EA080EB16BE57F8C6FBD0E129EBD156EB58760D021ECB9E42761D8584F57378637EF5328F33F43F98BA4AAC0B53F7CCB01FBD712E2D269546C35
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\196A.tmp

    Filesize

    1.9MB

    MD5

    265fca59756598b282a06cf0f6d42f51

    SHA1

    0aefeae8eef919ef3190f48beff4d13a5b81fa63

    SHA256

    87df3ec082d81db6e291d0fa59afa0d915c4f1da842b6db4bb67d846b5283798

    SHA512

    e7a5f481dfa2ca568755653e946d76c1ba3a55dde2d1e6b4a0d280f36fd7fac12f43e5fde4413a24b8baea0e559c19e09a6757a385bad2cd5ce360e2be20be23

  • memory/2260-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2744-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB