Analysis

  • max time kernel
    94s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:42

General

  • Target

    e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe

  • Size

    7.8MB

  • MD5

    22877c8c09c57b7030f00482c5df5d50

  • SHA1

    4a8031a998528415d5249840dd4061919846553a

  • SHA256

    e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39

  • SHA512

    959fb957fdcced29edeaf14371fabaafb04c1e37610069e29aeb8dcdcd0bea7e10112867760aa48e4fe4647459e9d9aabbf133b722c734a67d703ce706f382a2

  • SSDEEP

    98304:emhd1UryeHZNLJbT1OzVmNh5orPV7wQqZUha5jtSyZIUb:elnZdlT1iV2bor2QbaZtli

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe
    "C:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Users\Admin\AppData\Local\Temp\8E36.tmp
      "C:\Users\Admin\AppData\Local\Temp\8E36.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e7ecd3a7d0ccc0f4b31a76304469337bba0ac000e9b8b3f4c3bfb8da17c7ef39N.exe E8CF2BD0E5A90ADC205BEA3BBF767FCEFA4DEB0AD0A093E5990E2CFA7406B53D6E4D1BA8970FA8684CC24BCEBAEDBA730AA381065C27285A5E07F6337AB670FD
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8E36.tmp

    Filesize

    7.8MB

    MD5

    30ddbe43f46a1840ee37ee871a15eb19

    SHA1

    7fbc60e178f376efc3c3820479dd4b24080560e1

    SHA256

    933954a68de5cef7035da8c291e221998569c6859499089f99d37f4cc7a4db0c

    SHA512

    8bdb06b9db655ccbd10278027d3f58929d07518fb838381da332ed5ccb048b1d90e4642804fc1d5fcdbe61ffeb08978255b5f88f654aeaa0dcba88e6c7725d12

  • memory/532-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/4004-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB