Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:29

General

  • Target

    8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe

  • Size

    413KB

  • MD5

    931055616a9dda01ca171797a2c432d0

  • SHA1

    0d2b81b77d8b8aa35758b0f5e3cf5f8a2c92d3f1

  • SHA256

    8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96d

  • SHA512

    4b0b64be9cee1a8fadd37c9b448acd3107635cbbbde5b813880acb13d956ecbed08a6a087abd3ed12a4b24e6485d2591e1f860c9333c0069e9b6bd95293174a9

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFLkBtadn3byQlT5sILLPrqHg:gZLolhNVyEq4o3jNmeHqHg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe
    "C:\Users\Admin\AppData\Local\Temp\8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\7475.tmp
      "C:\Users\Admin\AppData\Local\Temp\7475.tmp" --pingC:\Users\Admin\AppData\Local\Temp\8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe 1903F2CA67371046DC6D2A83D6CD9BC648C2897917B5A75DBC4A75B37D7CF6D1AEB510774F50090AB7F95E9F183C390B9EF635C3EBEAF9D49C5A1A0D6E05E51C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\7475.tmp

    Filesize

    413KB

    MD5

    11a8614e56c214f1fd31f00ad2f3cb59

    SHA1

    98be3ccb87f9a257ec4f6c9e261bb3093fdfae0c

    SHA256

    8712de277fa872deec68a3deee689a50ee7e63d1558fe59f34186af9567ad45c

    SHA512

    456e2d86db427a259ffddc6d11597a451b96752c5590172e04405dd759e0edec57863221187337b37b57815d65dad0b4a1f6a6866bd14b44f1aa212e7e742690