Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 14:29

General

  • Target

    29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe

  • Size

    1.9MB

  • MD5

    e761af159f59a88e309234e6524c0ab9

  • SHA1

    23bb19728b058724d7dd83a76e997e1577e5b73b

  • SHA256

    29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b

  • SHA512

    2b3e55d19a4aa4de199a2f2f403520d757edb204fbbbd0ef202496c02b71be7089da1cf6eb37635abee8a7cc707c51a7df3a3cbc469390a3a2b349fe81baaf14

  • SSDEEP

    49152:Qoa1taC070d02RUIRAYOgicG5QSzWpEHmV32Oc5/woMu:Qoa1taC00RYpcyQEm4dwoMu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
    "C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\ED3C.tmp
      "C:\Users\Admin\AppData\Local\Temp\ED3C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe 326AA023C9EDEC361F0C61B67BEC3C6CD62D1D88C4A2E4F8BFD768606772A48B212CD1322EB5E217617C7F5060E160AFEC4F42015915F15E19B170B37F540A2D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ED3C.tmp

    Filesize

    1.9MB

    MD5

    b058cbeb1625f011c8c871e92d83287a

    SHA1

    cc43746633f17a64ec4c1e2bcf21542527a161a3

    SHA256

    9e0b2529c8668f4b329e6a21ac1b748fd7348be76bdd2fd8f182f6a781216244

    SHA512

    6f29e17ad4937e3d411ae163ec6659ec7a1ef6f8eede2b6d3ada2cee3e3e6ee189f42820c564993fa244f3b7fed7159a2e4a99defb88af4879a8c74386d9a748

  • memory/1720-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2308-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB