Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 19:54

General

  • Target

    1883e8de94808ebd9d8d25b0f60e06e0N.exe

  • Size

    5.5MB

  • MD5

    1883e8de94808ebd9d8d25b0f60e06e0

  • SHA1

    4bbc4330abb7261ebe4537590fbe5c443fc26f77

  • SHA256

    7265e6143c20a0c565a5ff36fbee23cd74c0b8979472ac6b36bfb4ac08a8813f

  • SHA512

    004247c4f52b09c944c1ecc5dc3cb8751a8a2d4d40bb13a98c57a1491f9417d8616c940755b1f69639ded414b9a8a93d9226fe84def63d71b3108773be00a0d7

  • SSDEEP

    98304:zFXZp6+Wvl3D1tBpzOUV3m+hVGiqhx0RHbNvR5D1toKOQ5MpIcRnVKN1f:xpLclppiUFm+X1v7lD1tZOBFVK3f

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1883e8de94808ebd9d8d25b0f60e06e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1883e8de94808ebd9d8d25b0f60e06e0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\69AB.tmp
      "C:\Users\Admin\AppData\Local\Temp\69AB.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\69AB.tmp

    Filesize

    5.5MB

    MD5

    0e4c10a8d840119de1c95f96d1c40389

    SHA1

    575ca609ee2665fc79814e74c7c40819fabec399

    SHA256

    2eaeea74f423bba4ce4eeb106cde541c3bf455542fbd5e9a48c8d818aef2dc5d

    SHA512

    7c8d3da2cc6c181ef36b80c11be9f4fe2c731918120d9a6e42b565dc825a2f37a41759e9f4dfa186732cf85e804407a811a6ef47437bea05b502532062bd4253