Analysis

  • max time kernel
    95s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 18:18

General

  • Target

    06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe

  • Size

    7.0MB

  • MD5

    ee62f6b133d214cfcb519f70cd86774c

  • SHA1

    201e826ef70a432c9f7872173870b192a7af068b

  • SHA256

    06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86

  • SHA512

    a914099fb84f42d4517a6c2c1aa84b0d324cb9eee5d2a578784b1c232d2db18f54098508b6d321c34404936f57cc6bb58212c4329291a904e2a8744ccbb41fd9

  • SSDEEP

    98304:emhd1UryeAnQVi19EUGuKKHV7wQqZUha5jtSyZIUbn:elgnT1aUG2H2QbaZtliK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
    "C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Users\Admin\AppData\Local\Temp\8CCF.tmp
      "C:\Users\Admin\AppData\Local\Temp\8CCF.tmp" --splashC:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 07E3F5824ABC55C9EE9D9529FC7064A7AFFB90D9C6A28DEFD3BDEA20BB491FD6F5E5E0DAF5AFD5D046209ACD866252386463FF15D62851F88ACF9B4BCC906C36
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8CCF.tmp

    Filesize

    7.0MB

    MD5

    2be9c536d67b5eb3b3db8b42f0da98d5

    SHA1

    f62ab6e8c5e4aad7a96d6f417f197b7d014c1387

    SHA256

    9cf68ea1b6f2c7517f180fa5e777243a25e06d984f9cfde552c4d08d4dbbbe74

    SHA512

    499c5fa5944dafd11fabede1370aefffe294a86e4cf7196b78642285ccfbbebf39d63ca9cb5c57cfdea4b1107dfe95713dec09b6017c16b983eba832d3816a3e

  • memory/3220-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/4700-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB