Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:29

General

  • Target

    8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe

  • Size

    413KB

  • MD5

    931055616a9dda01ca171797a2c432d0

  • SHA1

    0d2b81b77d8b8aa35758b0f5e3cf5f8a2c92d3f1

  • SHA256

    8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96d

  • SHA512

    4b0b64be9cee1a8fadd37c9b448acd3107635cbbbde5b813880acb13d956ecbed08a6a087abd3ed12a4b24e6485d2591e1f860c9333c0069e9b6bd95293174a9

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFLkBtadn3byQlT5sILLPrqHg:gZLolhNVyEq4o3jNmeHqHg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe
    "C:\Users\Admin\AppData\Local\Temp\8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\F4EF.tmp
      "C:\Users\Admin\AppData\Local\Temp\F4EF.tmp" --pingC:\Users\Admin\AppData\Local\Temp\8913e325dfbf704242a1695e79a0f081a7cb2ba5448721ae6bb514236d06f96dN.exe 70EA176E3A46BD0AAB01A4AE9339E2D91C60B05B3B94A39C167C5460DD145B3930383D804C7AF6855AD95E4D2512919B1B02E1DDCDCEFA02585EEE5DAC958A5F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F4EF.tmp

    Filesize

    413KB

    MD5

    c4c38c1185145a3a98f0bbfbc053df6e

    SHA1

    53f3594b15896bbf8ff9362e2add4628d61b7616

    SHA256

    34f96fc26502550a586581f4d994cbd20ebe38ae3fe456edec16b7aa30c28770

    SHA512

    5b9aa0f6d3ec2e4530063cc3b8a7b58231bd38dffe6d45fcb83a47f3f5fe5d86da4dcbd454789efb77bc49c82bcfc0940323c6e14ecd3776c4c17a8947af9663