Analysis

  • max time kernel
    93s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 21:26

General

  • Target

    9d911c5fd34ee0bb61d7d5c851a02960N.exe

  • Size

    616KB

  • MD5

    9d911c5fd34ee0bb61d7d5c851a02960

  • SHA1

    8153b707571f033f7256834b4d57a88717da7bd8

  • SHA256

    0e260cb21e0326c4febba9914702be1c6b4f546d8134843cf8430c07e236a594

  • SHA512

    b4e82085e5c4813d5973ce05636e39abbac997c2106085a093d985fc96a3c305b84b0ba20f8d77b30d0db018e480a8808f317ac605e5c6b4652339179aac5c5f

  • SSDEEP

    12288:0W8m+95tHfF2mgewFx56wj0F3oRgms/E1kfgjdkAG+61hq5:0W8z95tdbgfx5Rj0WR3cfgjTG+61hq5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d911c5fd34ee0bb61d7d5c851a02960N.exe
    "C:\Users\Admin\AppData\Local\Temp\9d911c5fd34ee0bb61d7d5c851a02960N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\3E19.tmp
      "C:\Users\Admin\AppData\Local\Temp\3E19.tmp" --pingC:\Users\Admin\AppData\Local\Temp\9d911c5fd34ee0bb61d7d5c851a02960N.exe 57F3AD19C7634DDFDF6D1E76E74E327819C23AEC5DF903B3B014D6C605B3D605C61BA6EEA576EAFB4D6DB2D4CE9D3159AD6B1F41AD41C7AF2478DFE506211E6E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\3E19.tmp

    Filesize

    616KB

    MD5

    3eb1d6974db7e009bed39ca6813828ef

    SHA1

    437cf40fd4ebfab470042d8da245b703babfbd7b

    SHA256

    0e621cc7649f846a0e0b57df9e559f6ef57a2cc44f83151fca2427613870ec3b

    SHA512

    3f42a71a0f27a55a7eb3cbf19bd1610ba2bde93c5b28f62900a8da59bf4d2ac962f8d20355eba7932475b009b59a03404083a8f4d06b797f3de6d72d457a31fc

  • memory/2660-8-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3028-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3028-7-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3028-4-0x0000000002220000-0x00000000022B6000-memory.dmp

    Filesize

    600KB