Analysis

  • max time kernel
    80s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 12:43

General

  • Target

    765a6367bf63fa5716f9b576ccca6ee0N.exe

  • Size

    736KB

  • MD5

    765a6367bf63fa5716f9b576ccca6ee0

  • SHA1

    4ac16647c060b63983729d0ffc6809aa4db67673

  • SHA256

    e028f9f6d0981db0f838e13bc81e84ec23da5e21e7f89ce2d2b6bf39f8c30e73

  • SHA512

    c616a47544763a9caefc417e42f8eccccd513dfb886ddfe2b40c1ecde5bf398a7ab4d4ae7fbc8152a6c70e421f8c5ea15ca2b617d2fc624e8efb8426adfd1236

  • SSDEEP

    12288:XUcthLaX5iE45z6VQ5zCD4TyWTxpkhdb+3mXusCu7VQ5zCD4TyWh:XUcnmnXVQ5zY4xTxpgdb+3mXuzu7VQ5v

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\765a6367bf63fa5716f9b576ccca6ee0N.exe
    "C:\Users\Admin\AppData\Local\Temp\765a6367bf63fa5716f9b576ccca6ee0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\765a6367bf63fa5716f9b576ccca6ee0N.exe
      C:\Users\Admin\AppData\Local\Temp\765a6367bf63fa5716f9b576ccca6ee0N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\765a6367bf63fa5716f9b576ccca6ee0N.exe

    Filesize

    736KB

    MD5

    3ae38c88205a6b84af203a9fa417bda3

    SHA1

    d0b544464b08c7748857b55ae02ed2b5566a69b7

    SHA256

    ce6e855fb3fad2894004a0ff403a76049af5aebf1fa75c81fe451b14b2f99553

    SHA512

    87c6e024f6ff0bbc46a4cf28432a12a3a3b5f862259ed849d080e51c46e53480f64caa10d67896d3bfa74bad7691a37e95ef789226676e3362f063f8e8a1507a

  • memory/2468-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2468-6-0x0000000000140000-0x0000000000178000-memory.dmp

    Filesize

    224KB

  • memory/2468-11-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2816-12-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2816-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2816-18-0x0000000000130000-0x0000000000168000-memory.dmp

    Filesize

    224KB

  • memory/2816-19-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB