Analysis

  • max time kernel
    114s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 01:27

General

  • Target

    a47d7942129157b7fea5024ab2da5100N.exe

  • Size

    5.7MB

  • MD5

    a47d7942129157b7fea5024ab2da5100

  • SHA1

    9f51a44cbe33e7f9fd09270a7449f4613c79a707

  • SHA256

    2c2c1f45f0fb945ce506acaa5d60ff96c3c26ea5c13a581c0578211a1b3d6926

  • SHA512

    4c4d8af92df61234ac49cc1ef31cd3d4539bafbbe11010506f9a8d085d2d0fabfc5ca29212de28981f07fd933ed6d19bc124ba0a388a148cb06a0521452a6770

  • SSDEEP

    98304:ft3PUdLVdGTGSzfRnlkCfsVy3KkKT/ZKllMFji6iKRLtFFfjZ8GxwC/o15JPi9kH:fpMbEyGfllkCeyQT8Iji65RRff1jx9o7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a47d7942129157b7fea5024ab2da5100N.exe
    "C:\Users\Admin\AppData\Local\Temp\a47d7942129157b7fea5024ab2da5100N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Local\Temp\is-HQGK1.tmp\a47d7942129157b7fea5024ab2da5100N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-HQGK1.tmp\a47d7942129157b7fea5024ab2da5100N.tmp" /SL5="$A0118,5623105,141824,C:\Users\Admin\AppData\Local\Temp\a47d7942129157b7fea5024ab2da5100N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-HQGK1.tmp\a47d7942129157b7fea5024ab2da5100N.tmp

    Filesize

    1.1MB

    MD5

    2e30da9c21c0847dd7135895d6388d46

    SHA1

    3435b0964bd238022819733ea7f049b3b215df3e

    SHA256

    0002f4046ef35e169fa79e2abf0b92212c1438487819dd8318301991ff99acac

    SHA512

    d7dabdbeaab41eddfb045d55c4752485fe231373dd8e45af26add7a238e928fd7905ae3ee9a2df34f484eabe4d8b7bcda775ef12822993b1850a3daa58f06aae

  • memory/4228-7-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/4228-14-0x0000000000400000-0x000000000053B000-memory.dmp

    Filesize

    1.2MB

  • memory/4492-1-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4492-2-0x0000000000401000-0x0000000000417000-memory.dmp

    Filesize

    88KB

  • memory/4492-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB