Analysis

  • max time kernel
    100s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:39

General

  • Target

    4da6d05310e71458b83159152f8094594eff425a9c3c0830ff74b9922108b0a5N.exe

  • Size

    998KB

  • MD5

    e2ebb13007f594e9c71a7d6303f957f0

  • SHA1

    b8b007f3ded498a9870a05319db10f296268ab1b

  • SHA256

    4da6d05310e71458b83159152f8094594eff425a9c3c0830ff74b9922108b0a5

  • SHA512

    b9c29d890b16538b8dbb1b425adce5535a2aca9b392168425296fe7486023af0db1d9e39161929094a0576093a6bc64992e49a183b34a4abbe7310e80f921c3a

  • SSDEEP

    24576:pQqITGBUlEzQbs6gzBl75W+7DdsM9Dhyqmh/tYm7Vq3BSxl:rck9CxgzBJ5WDWhak3BQ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4da6d05310e71458b83159152f8094594eff425a9c3c0830ff74b9922108b0a5N.exe
    "C:\Users\Admin\AppData\Local\Temp\4da6d05310e71458b83159152f8094594eff425a9c3c0830ff74b9922108b0a5N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsoB972.tmp\ioSpecial.ini

    Filesize

    696B

    MD5

    0444e16581e941e2208330e61bdd98e7

    SHA1

    d03853f4dc3e1c544a0b9ff046370acb7543707c

    SHA256

    88adad0bad89a80783e60f2e607fd0e8a12c1e1d7d4c34ba866395db3b38f5ce

    SHA512

    b03f894017b12684731f1a3c1a3f7ccab9b8c0fc0f60621f60dc7a2320ba977d8a39290613364f627a4b08495758cc55916e830182698329baac992c91abe2cc

  • C:\Users\Admin\AppData\Local\Temp\nsoB972.tmp\ioSpecial.ini

    Filesize

    735B

    MD5

    ebd5197c21b379d5f398cc44c6936a01

    SHA1

    1c3044ffe0e9d85e03adecccc60d6e1005c7a0bb

    SHA256

    c70ace68e1e4a912aafb0c3002d0951f2942e44a642b0e0dfad55fe53030216a

    SHA512

    ab987f1c51861755abad73e7ec8cb74ec3222929746c379dbbd6605d500716f0f7bdae0cde476d8b721b12e31194dbe48af3bf7f4d70b9d17959aafeb3c8b256

  • \Users\Admin\AppData\Local\Temp\nsoB972.tmp\InstallOptions.dll

    Filesize

    13KB

    MD5

    d765c492c21689e3d9d61634371fd861

    SHA1

    ac200933671ae52c9d5544d0e2e8e9144d286c83

    SHA256

    551e6042dd494ea01549555ffc194ab9729da09058ec714eb368dd06642c9bbc

    SHA512

    9919a9e848c8f1e26c75d0d29207571e4b86a4140bd554743d2c1f8bd7f386fe4919345b163d89a5d907fb165e435ba0ac5f6b1101713636141f156a420e2e0f

  • \Users\Admin\AppData\Local\Temp\nsoB972.tmp\System.dll

    Filesize

    10KB

    MD5

    fe24766ba314f620d57d0cf7339103c0

    SHA1

    8641545f03f03ff07485d6ec4d7b41cbb898c269

    SHA256

    802ef71440f662f456bed6283a5ff78066af016897fe6bfd29cac6edc2967bbd

    SHA512

    60d36959895cebf29c4e7713e6d414980139c7aa4ed1c8c96fefb672c1263af0ce909fb409534355895649c0e8056635112efb0da2ba05694446aec2ca77e2e3