Analysis

  • max time kernel
    140s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:36

General

  • Target

    CustomRP.1.17.28.exe

  • Size

    6.3MB

  • MD5

    870ab8636ad23af5808c704cbb1a9655

  • SHA1

    ab4c1a35cb12d9e7c6d37fb71fdff0c3864867ac

  • SHA256

    0d7423a330f992c9dc0069891114c708d39da9a2a98a98cb5b29eb35f02922a9

  • SHA512

    0092b6c533b6983a7bf27c22764a1a2f21b4ec9296c488f6849545a2d1ab7ca41fc12267545a4819f0ad82cbc0ff31788f824c5604d787030f8d66e4340e6a6d

  • SSDEEP

    196608:ONvQVM6bSbs8gIiNR5jxNLT5TYYjVO5KtTHCx7hI:uQrSbs8gImNLT5RZOotH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CustomRP.1.17.28.exe
    "C:\Users\Admin\AppData\Local\Temp\CustomRP.1.17.28.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Users\Admin\AppData\Local\Temp\is-CQJS5.tmp\CustomRP.1.17.28.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CQJS5.tmp\CustomRP.1.17.28.tmp" /SL5="$F0068,5498552,1081856,C:\Users\Admin\AppData\Local\Temp\CustomRP.1.17.28.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-CQJS5.tmp\CustomRP.1.17.28.tmp

    Filesize

    3.3MB

    MD5

    773cadc010f451565e4e711023f9b95b

    SHA1

    6b68d46d6bdf5011fd1506f4939cd1d0d44b424d

    SHA256

    bd8e162b8c213a0dbbc614397f3f35fd3189386ce02caa91b9f907e3edcaa7b6

    SHA512

    1e2f900f79c5f29dc57fd3de422fabe723c7bb55f9e7e2d5d17eb8a525710577866e92bf482bfe6acba791aed2436e30ec1bdbf34bc82bec49be62fbad1dcf09

  • memory/4748-0-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/4748-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/4748-8-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/4896-6-0x0000000000400000-0x0000000000751000-memory.dmp

    Filesize

    3.3MB

  • memory/4896-10-0x0000000000400000-0x0000000000751000-memory.dmp

    Filesize

    3.3MB