Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 01:39

General

  • Target

    b0fb2a5eeb7b89540213e41ad9863dab054d0b230933f6dc5b64f78dea7dd574.exe

  • Size

    1.2MB

  • MD5

    cac79bd6aa0c1f54535b79738eb28aab

  • SHA1

    59b28eaf08b65895dc9c20e74f5b36e3210c61ac

  • SHA256

    b0fb2a5eeb7b89540213e41ad9863dab054d0b230933f6dc5b64f78dea7dd574

  • SHA512

    e0a34530ab89ba85291e5fa2e06e7e0c0819790dd4f38a09b8e5a542e625420e0c9b365cb3a3d70f4210d0636b82285fb08d0dc4a734d345430a184c6e2cca5b

  • SSDEEP

    24576:qqDEvCTbMWu7rQYlBQcBiT6rprG8aCU3W/W+7E+9mSfk:qTvC/MTQYxsWR7aCwWL7EkmU

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0fb2a5eeb7b89540213e41ad9863dab054d0b230933f6dc5b64f78dea7dd574.exe
    "C:\Users\Admin\AppData\Local\Temp\b0fb2a5eeb7b89540213e41ad9863dab054d0b230933f6dc5b64f78dea7dd574.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\b0fb2a5eeb7b89540213e41ad9863dab054d0b230933f6dc5b64f78dea7dd574.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autA19F.tmp

    Filesize

    281KB

    MD5

    b20bf60244d07bca49b48352bf507bcb

    SHA1

    c7589621dfff55ae82b71b65252eeb45a4db2013

    SHA256

    e5b9ede5ec9b779d128011efabad6d0f7cf8dc0041f057427bd9c82508bc811b

    SHA512

    edfe94f6049a84ebcb93bd540461e18d2fd5e7f3da00285ea15ba49ca10a1839a352e846dae82eccdf029ebe0c59b9455ca082d2ba0ccc4a8bdada37de5b1195

  • memory/2936-14-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2936-15-0x0000000001000000-0x000000000134A000-memory.dmp

    Filesize

    3.3MB

  • memory/2936-16-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2936-17-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3076-13-0x00000000026D0000-0x00000000026D4000-memory.dmp

    Filesize

    16KB