Analysis

  • max time kernel
    119s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 11:09

General

  • Target

    8f60c1c35b47d33b8f5687ec4626dfa8c57f763cf60330156f16fc939bf1555c.exe

  • Size

    161KB

  • MD5

    e607244e81604ecbc16378b210ed1c1a

  • SHA1

    ce33b33c4b921fa8e256e4c4464f073d52ea7ed1

  • SHA256

    8f60c1c35b47d33b8f5687ec4626dfa8c57f763cf60330156f16fc939bf1555c

  • SHA512

    e10fbdb1ccd55a700af7a4f3dd8a32be8f3c6433a224082b8ee8b9bee3872273a940b6395b124406cefe551f53f907139431edf4236aa6d162ffb08eb52d4284

  • SSDEEP

    3072:nmmHmkxbuFD82kzVRqg23RPHksXtLd0Nsr85iXfyBCEnHNe4rPdB+XGSlZ51Jd4n:nTPxbuFDZkhREMshdrH+HnHNe4E0

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f60c1c35b47d33b8f5687ec4626dfa8c57f763cf60330156f16fc939bf1555c.exe
    "C:\Users\Admin\AppData\Local\Temp\8f60c1c35b47d33b8f5687ec4626dfa8c57f763cf60330156f16fc939bf1555c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c curl ifconfig.io
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\curl.exe
        curl ifconfig.io
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c whoami
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\whoami.exe
        whoami
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:892
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ipconfig /all
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:2612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo %USERPROFILE%\Desktop
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4680
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c dir C:\Users\Admin\\Desktop
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3612

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads