Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:42

General

  • Target

    e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe

  • Size

    7.8MB

  • MD5

    22877c8c09c57b7030f00482c5df5d50

  • SHA1

    4a8031a998528415d5249840dd4061919846553a

  • SHA256

    e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39

  • SHA512

    959fb957fdcced29edeaf14371fabaafb04c1e37610069e29aeb8dcdcd0bea7e10112867760aa48e4fe4647459e9d9aabbf133b722c734a67d703ce706f382a2

  • SSDEEP

    98304:emhd1UryeHZNLJbT1OzVmNh5orPV7wQqZUha5jtSyZIUb:elnZdlT1iV2bor2QbaZtli

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
    "C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Users\Admin\AppData\Local\Temp\9C9D.tmp
      "C:\Users\Admin\AppData\Local\Temp\9C9D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe 74B7CAC37081524104E7C83B51D96AA48135D1A2391377232B9CC11E5D649DA58982F073F8C59DB52FCECC9A18E0D8C319DA772F39A5B0B48FB85BFD7A190B1F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9C9D.tmp

    Filesize

    7.8MB

    MD5

    6eda9896ca49ff7bcb98c3ef6db422d6

    SHA1

    f4382ea0ff6d193b1285bdc0db6992dc878378c4

    SHA256

    578119089f49a9ff9794578d522964cd65aa376e96922bc81415dab2df53c5fa

    SHA512

    2bee888dd857a0593ab982891d3acdf8e1155375f2d38308499bc7ba8e5907a0ea0a2e40322cc589ff0a0cbbb3025bbca0273c68c1e40469e8c7d104a4eccd6f

  • memory/236-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/1636-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB