Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:53

General

  • Target

    c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe

  • Size

    816KB

  • MD5

    b1976b6919e2399ea79000c8468a055c

  • SHA1

    3a492e7c0fde824d07d71f83577eaf9f2193c137

  • SHA256

    c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2

  • SHA512

    7f21bb33c6271d50c6ae78409a30e1f141cee6fec81f7ea1d0aa91d483a8866c664aa79f9201bdc8b0dca24e7d68a9dce00158681a2177c00ecdab1872ed9e89

  • SSDEEP

    24576:DY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9Y:c3XZynV4oDabuWbDQOcIxJJ9Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
    "C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\1C0F0A0A120F156A155F15F0D0C160F0E160D.exe
      C:\Users\Admin\AppData\Local\Temp\1C0F0A0A120F156A155F15F0D0C160F0E160D.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1C0F0A0A120F156A155F15F0D0C160F0E160D.exe

    Filesize

    816KB

    MD5

    0676fae5274ebd320a581f0a9a79a4f1

    SHA1

    0e14d38b840aa23cad4325f424536c8a4874c5f4

    SHA256

    25bdb8820c0d523334fafc3dcbd77b769fd31490ebbfae62db75a7fa1021338e

    SHA512

    cf6c908388953eafe3e3d8cd5ff88647c1f99cd03ae57bbc0ed56288cce061489e286ca2b029eb138787428dfc537e17aaaa944a4f0f4f1320db2f52c7c2c3f2

  • memory/1680-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1680-12-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1680-11-0x0000000001F20000-0x00000000020CD000-memory.dmp

    Filesize

    1.7MB

  • memory/1680-10-0x0000000000401000-0x000000000041F000-memory.dmp

    Filesize

    120KB

  • memory/1680-5-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2404-14-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2404-15-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2404-16-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB