Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 12:01

General

  • Target

    8e5e8f25ce01538f76551b76322074d0N.exe

  • Size

    36KB

  • MD5

    8e5e8f25ce01538f76551b76322074d0

  • SHA1

    05a05ed8a4929f3dfea30d125a0ac38285c45682

  • SHA256

    d83d9fa6c243aa95e79ef375846005dfb9fd2ff0fb1f62003fdfee3e7d0977fd

  • SHA512

    c8a48fb80e11a113c6d4f53bb68734037d31d76b9b08e457d6b3b6f35801425f24fd43297732424f1eac83a4eb17151c50dc701c125c5c115c8f2a72b3d9da6d

  • SSDEEP

    768:sAI5y4MnESa8AWo6/yaAW7++KvWqrOeecNa0SGwQd3Y:skEuA2aaAW7s5XjY0SU9Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e5e8f25ce01538f76551b76322074d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e5e8f25ce01538f76551b76322074d0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\ieupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\ieupdate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ieupdate.exe

    Filesize

    36KB

    MD5

    d9af8284dabd11d92bdadfd770293e71

    SHA1

    e1acd606a0e592d3b749bb7a824340a5047d48eb

    SHA256

    1310a251096264545720d36477334f04a16f28941baa748cdea9a9af5fa60c1d

    SHA512

    f8f6ed21af94e7127eeedbdfee25e5ba257362e3c0296185cade2094732e6a4752f7ba5f7e92ab9b2b6983fa78edb293c0961e065aab026a1f376326137baa7c

  • memory/1756-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1800-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB