Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:47

General

  • Target

    fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe

  • Size

    5.4MB

  • MD5

    c21f40b89a3f2dcf6c83964c12e63edc

  • SHA1

    4528ae4d6fd9caf304af2579f405af8ae11d4d19

  • SHA256

    fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e

  • SHA512

    f3586424d545212f4347178302200a3123cf77b55d3fc7a7c701bd6562041e094c435328f5eaaa4b0e71b4b05ca3a0718af51d6629919007fb2a34c37fa60734

  • SSDEEP

    98304:emhd1UryeKdQ733aTeUyRnV7wQqZUha5jtSyZIUh:el4Q760p2QbaZtliU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe
    "C:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\AFF7.tmp
      "C:\Users\Admin\AppData\Local\Temp\AFF7.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fd7f70719a9f1ff87f62dfc13348dfc4e3510b0d5dde3cbdf6009437c5708a9e.exe C089E413D5820077574B73C9A214EA3F8A76B534101D178ECD109B87FD34CCDAFB350449F912C30893063BC5E98B9524638D81E74DCD582BC722443F48E7698B
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\AFF7.tmp

          Filesize

          5.4MB

          MD5

          a1f0227e8498e7bbbd50a06451338657

          SHA1

          8abc4f7de7870a0db234fc439b883a59305af80b

          SHA256

          7e58be9e4cab3693ce9ac86e6c4fc90204441c56a68ed80337d301b4001631c1

          SHA512

          ecc638f9674d25a7d5b8741575687a0503c45b6e995042e25577272be6291adc129fe0d4ff3ae4cd1707aeccdf42dd6278fc7309261d985929f9e2b24ddb376e

        • memory/1000-5-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB

        • memory/1852-0-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB