Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 14:05

General

  • Target

    ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe

  • Size

    1.2MB

  • MD5

    db1bbff547488ab72b53499caa016bfe

  • SHA1

    9883a77786a4e9574e8efd78fc15e9d8837f8d0a

  • SHA256

    ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83

  • SHA512

    00d6e673ea24aa1be6cad949ed5449d04ba342540e0e41a5113ecbee1edfc713fbc021f8bb651d5df0f84fd1528705c17a1f39c278d60910cae9dae2ec6c91d2

  • SSDEEP

    24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8a0DYJR9FRzw/lBe:fTvC/MTQYxsWR7a0W9Fxw/l

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe
    "C:\Users\Admin\AppData\Local\Temp\ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\ff09824427feff9ffada92786ec79e63f6e22dd2e5ec70022a374ec3ad120c83.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\brawlys

    Filesize

    280KB

    MD5

    df2cd555ad939e59859a447f1ecaf907

    SHA1

    3bced93911f9c029e4efc6c56f84b0f2db05dce4

    SHA256

    e320ae6ad4c1fd14f4351bd970fc552c65b923d8f83836f6b9f2d2e65120b09d

    SHA512

    79e9cd39b2d804aa96654e8b5d594021434b7c287db5be2c1b07afc50a7ca654ec677993fcddd017a7b4341558e4d597bf4bbdc006a8d210341beb629ecd5157

  • memory/2648-12-0x0000000000120000-0x0000000000124000-memory.dmp

    Filesize

    16KB

  • memory/2808-13-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2808-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2808-15-0x0000000000900000-0x0000000000C03000-memory.dmp

    Filesize

    3.0MB

  • memory/2808-16-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB