Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 04:22

General

  • Target

    f713ec0978da17f79ce7aeea9a60ad30N.exe

  • Size

    648KB

  • MD5

    f713ec0978da17f79ce7aeea9a60ad30

  • SHA1

    37f7fda311c6fdb9f9f53285b83f86dbce667437

  • SHA256

    21019d1c87a1dfbc77c178d1edfd873dd343e7b1aa8c12c5b90af3dd4a04491c

  • SHA512

    269963442e5fda37de3bdccb8b20f3b56faeaa046ca27a0bac16ef9cad3dee39de796614b12e3e525c9759caafde8885beaf4e28daa3d942c03e07d0d7317fa7

  • SSDEEP

    12288:TC5ZMKQauyaVZzdXtoNPN4QUQauyaVZzdXI:WXOabaVjKNPfabaVjY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe
    "C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe
      C:\Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:604

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\f713ec0978da17f79ce7aeea9a60ad30N.exe

          Filesize

          648KB

          MD5

          7d87e2c004976f2a835a72e0bc2ada85

          SHA1

          41b649e14a2feb0e0efc4e7591a09dfbec1e126c

          SHA256

          524d05f6d11578fbb89e326bdbf7865d67a12c27349396abdfb4204db3d95dc8

          SHA512

          b8c1d691b7233c089d8002822aba4ee0da25bfaf60e26a74faa000df8d99189041ac307d6ca35fbe7d59ca9ed0ed8c83c1c20c56e65bddc09d12e4406a8ac100

        • memory/604-18-0x0000000000140000-0x000000000016E000-memory.dmp

          Filesize

          184KB

        • memory/604-24-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/604-29-0x00000000001A0000-0x00000000001BB000-memory.dmp

          Filesize

          108KB

        • memory/604-30-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2512-0-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2512-7-0x00000000001E0000-0x000000000020E000-memory.dmp

          Filesize

          184KB

        • memory/2512-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2512-12-0x0000000000210000-0x000000000023E000-memory.dmp

          Filesize

          184KB

        • memory/2512-17-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB