Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:03

General

  • Target

    b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe

  • Size

    4.4MB

  • MD5

    8dd793eadd752e13d9f5c9efd5971b20

  • SHA1

    1343e4abfc01926f7b215b1558bed5246625bf68

  • SHA256

    b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dac

  • SHA512

    5d9ad58734bbf56ff8c40d733e9830f9c6803c667281172893249f0736bfd0455f3565aeda7ea7ab169081f6fac070ddd81c8c88dac1b75c02c8a387fb75230e

  • SSDEEP

    49152:Svm2AC0d1XqrdryeJVfhSRSla7s2ZVe3MA7HlsBp7IswLVT5dVXeQqZUhh4r5VCB:emhd1Uryeis2ZgGp7yV7wQqZUha5jtSn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
    "C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\D134.tmp
      "C:\Users\Admin\AppData\Local\Temp\D134.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe F861556D260C3444907052F603FA38B6BD43249BF7A3FAF7AF893BDEE6623294DC28C0EDD398AB984EE32275CD22AE2E3A68630855BB2B69F68DDA877D998A91
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\D134.tmp

    Filesize

    4.4MB

    MD5

    4caf255c8d002bfb2a8d91df26f7fe55

    SHA1

    b3ae485cca5fe890b2c98ab0c24bd7c62bd37409

    SHA256

    8e885bf594a69ae79dc4d5350906e033d479959c8234a23713b294cf97b9352c

    SHA512

    735e961f497af315e31cdecd178d60c5faf39a4ea8c3590f39c8dcad59576996abab763d734c8cec4dad9f33d7e5ac84476582ff22dadc2659983ffdbf42b9e3

  • memory/2124-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2352-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB