Analysis

  • max time kernel
    93s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 14:29

General

  • Target

    29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe

  • Size

    1.9MB

  • MD5

    e761af159f59a88e309234e6524c0ab9

  • SHA1

    23bb19728b058724d7dd83a76e997e1577e5b73b

  • SHA256

    29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b

  • SHA512

    2b3e55d19a4aa4de199a2f2f403520d757edb204fbbbd0ef202496c02b71be7089da1cf6eb37635abee8a7cc707c51a7df3a3cbc469390a3a2b349fe81baaf14

  • SSDEEP

    49152:Qoa1taC070d02RUIRAYOgicG5QSzWpEHmV32Oc5/woMu:Qoa1taC00RYpcyQEm4dwoMu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe
    "C:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\735B.tmp
      "C:\Users\Admin\AppData\Local\Temp\735B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\29aeb29e0d203d814d98a3ce261460c67c6c37342ac77a19ee6b2eaa8f82ef6b.exe CCE8C6C6890CF7180C309C52E40F3774D3B81D392BDDF8B42BA5E70E3309E7D747EC53C23A2136C260BEC02F57D247CEF1BCD1E764AC556CA1369E658435B996
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\735B.tmp

    Filesize

    1.9MB

    MD5

    7f701209ca1a35789f5a80d00058ac2a

    SHA1

    f47799b095946d4e12f371db5e31776d7439d1cc

    SHA256

    50650a7b307ae5ae034c4eec902de78835900bbabd92ad044ae97f0e9b328f76

    SHA512

    48c54a42eaaa23da3e725cf7f55ecc154873584ec73f48e2e8395f799280f51d17ac10e382cc222a75621725b9ff7d664a3c55290b33e0212d1d68861872aad1

  • memory/2636-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/5092-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB