Analysis

  • max time kernel
    97s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 01:33

General

  • Target

    5eed5081084c94e8fc420dfbdf5fb960N.exe

  • Size

    6.6MB

  • MD5

    5eed5081084c94e8fc420dfbdf5fb960

  • SHA1

    a8dbbab463663006e2409f4cbc629707b6ae069d

  • SHA256

    c34846c546e71c6f3d1a648fdf0f3a1707722042f029a1b1e1ec8370fa7741f5

  • SHA512

    75d2e2601b71d81a26493e9e51233234954a7ee8668a6125ccf9e7dd5d6ab49775c98ce3f461905cb8397391cf205c0fd4ace78b87e3a7c15674a462dae909ae

  • SSDEEP

    98304:emhd1UryeUmNYdrU1spkj1UoR1Hb/1V7wQqZUha5jtSyZIUbV:elZ1spo1VRpz12QbaZtli8

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eed5081084c94e8fc420dfbdf5fb960N.exe
    "C:\Users\Admin\AppData\Local\Temp\5eed5081084c94e8fc420dfbdf5fb960N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\7A7F.tmp
      "C:\Users\Admin\AppData\Local\Temp\7A7F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5eed5081084c94e8fc420dfbdf5fb960N.exe 5335D9AFBD1AF345AAB57B20CF1AD0E2CC90F9E85FA9BFF77F56E23141A4701CD5CDDBE667BEB1198494D95A0CEAC80D75B7CD17F386E8807064D30577B52DAC
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7A7F.tmp

          Filesize

          6.6MB

          MD5

          45f019777bd43eaac0f18a3116944d0e

          SHA1

          1ea2a8f8ae1050d7cc3479d19fca4642f1901760

          SHA256

          a38ad8d9547b5c6fb8f5917e8a5eb553c9b106eea3117501f2b86bc6919c0e7d

          SHA512

          6136ae82f8f47ea22e23bfe4a3c8c8849d537d48eda6ce6cde021883e110449a3ad9b6efd0e63b0412c6436cf4434e0034b2ae3241c5b691f709ee05ebbe0221

        • memory/2284-0-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB

        • memory/2404-5-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB