Analysis

  • max time kernel
    136s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 18:08

General

  • Target

    01e1ba7da4ba0dab57d85b6d587032b746827773e607c77d5f6b0014df24b711.exe

  • Size

    92KB

  • MD5

    6be009917289ab74d4e0030c26367323

  • SHA1

    ae6908af66e3c3fdd462c4193934f25c59d9d58e

  • SHA256

    01e1ba7da4ba0dab57d85b6d587032b746827773e607c77d5f6b0014df24b711

  • SHA512

    c943ec2007d7335575c67ece62fe5d8cd7c2d8ea0d770832aa7bb344a105e291be877d6822f87fe1da0148118028e070015eb181ec9aa405238f859da0ff79af

  • SSDEEP

    1536:jqBcjcygYu1nPyh0+mVVxlX9qNlmDWhX4eUH9AwkD2Y8T9NhOUws1MK:jqBG0+4xlX9qNlmWhjUGwdb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e1ba7da4ba0dab57d85b6d587032b746827773e607c77d5f6b0014df24b711.exe
    "C:\Users\Admin\AppData\Local\Temp\01e1ba7da4ba0dab57d85b6d587032b746827773e607c77d5f6b0014df24b711.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\murzuja.exe
      C:\Users\Admin\AppData\Local\Temp\murzuja.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\murzuja.exe

          Filesize

          92KB

          MD5

          591ea58dce0b6947895ff10486e66b16

          SHA1

          0a4a6e8529fcaba2360f5e6cab98cf03a9b75868

          SHA256

          28f086bc0d89e8d352b2b141aa88f3afb6ef51e533b7f685cdb98639c54ca4a1

          SHA512

          0a431816bda208a5a7a03c5da34b2de3883e22222219ff98e76fa61946caf3fc79f13f0116ee74d5634e11f290234cdf408b1dbb168625f88c0d6353e0580225

        • memory/2712-7-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2736-1-0x0000000000401000-0x0000000000404000-memory.dmp

          Filesize

          12KB