Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:53

General

  • Target

    c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe

  • Size

    816KB

  • MD5

    b1976b6919e2399ea79000c8468a055c

  • SHA1

    3a492e7c0fde824d07d71f83577eaf9f2193c137

  • SHA256

    c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2

  • SHA512

    7f21bb33c6271d50c6ae78409a30e1f141cee6fec81f7ea1d0aa91d483a8866c664aa79f9201bdc8b0dca24e7d68a9dce00158681a2177c00ecdab1872ed9e89

  • SSDEEP

    24576:DY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9Y:c3XZynV4oDabuWbDQOcIxJJ9Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe
    "C:\Users\Admin\AppData\Local\Temp\c1b4a4068eb320e8d1ba487aa0ec4acec995c4444f360728efdbec1c1d17dfa2.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\1F0C0C0C120A156D155D15E0E0B160B0B160B.exe
      C:\Users\Admin\AppData\Local\Temp\1F0C0C0C120A156D155D15E0E0B160B0B160B.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1F0C0C0C120A156D155D15E0E0B160B0B160B.exe

    Filesize

    816KB

    MD5

    569c4db7d8d328d94dbbde53b7913fe7

    SHA1

    9cea10acdbfc2d32d65a2436953f414b44959a87

    SHA256

    24222dac57787ba41748445a1472fe6e8997e505fdc6e2bd00ec7d5c3803698d

    SHA512

    93996f830ba1a4caa04c1ed6fcd525f1f9ba624d7f5297ea1551e7c56d902e1651337355d3bd50f7af61e2d0f7aca9d7ff77ddd9e2d2c910876d30a7a16b0de8

  • memory/1912-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1912-2-0x0000000000401000-0x000000000041F000-memory.dmp

    Filesize

    120KB

  • memory/1912-1-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/1912-8-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2544-9-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2544-11-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2544-10-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB