Analysis

  • max time kernel
    94s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 15:10

General

  • Target

    PO #86637.exe

  • Size

    1.1MB

  • MD5

    5b77c06c6cb2bd85ffd91363b9b94c8f

  • SHA1

    e6307c82fac4bb7fd757255afae7b7863a70dbff

  • SHA256

    b3d4552525fffc18e9f7ebeb7382b205c7bfffcd9db331f6b0bbaec71ccb5ef2

  • SHA512

    19ae2b4a1a5e70a6eed9b75d696f54dff1435bac0e423ab533625e2f3fff9e7074e850bf87dce7b97a008a18f72dba3c317e7744f4f43e13414b22aec5b14bb3

  • SSDEEP

    24576:uAHnh+eWsN3skA4RV1Hom2KXMmHap2AfB75eMzb0SC9VME45:Zh+ZkldoPK8Yap2AZLb0SC3Mr

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO #86637.exe
    "C:\Users\Admin\AppData\Local\Temp\PO #86637.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\PO #86637.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autC237.tmp

    Filesize

    280KB

    MD5

    c987493eacd91d156e25416647987616

    SHA1

    e07a0142c1cca4c3aae263500596a323afee4356

    SHA256

    a8cbf25b8e9ad51e3441315f7f0559328d54a74cf8ce54b6d7a3d35c29634041

    SHA512

    79ac0d6fecf7507c1e82a407dac9a6589c3da3bfdd475d832b3c4e71c98b9dff77df8a01d9ee530189dc5731f806151951aae748e6bb8c4420b85ea623079f4c

  • memory/612-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/612-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/612-16-0x0000000001500000-0x000000000184A000-memory.dmp

    Filesize

    3.3MB

  • memory/612-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/612-18-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/4928-13-0x0000000003700000-0x0000000003704000-memory.dmp

    Filesize

    16KB