Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:03

General

  • Target

    b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe

  • Size

    4.4MB

  • MD5

    8dd793eadd752e13d9f5c9efd5971b20

  • SHA1

    1343e4abfc01926f7b215b1558bed5246625bf68

  • SHA256

    b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dac

  • SHA512

    5d9ad58734bbf56ff8c40d733e9830f9c6803c667281172893249f0736bfd0455f3565aeda7ea7ab169081f6fac070ddd81c8c88dac1b75c02c8a387fb75230e

  • SSDEEP

    49152:Svm2AC0d1XqrdryeJVfhSRSla7s2ZVe3MA7HlsBp7IswLVT5dVXeQqZUhh4r5VCB:emhd1Uryeis2ZgGp7yV7wQqZUha5jtSn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe
    "C:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\B093.tmp
      "C:\Users\Admin\AppData\Local\Temp\B093.tmp" --splashC:\Users\Admin\AppData\Local\Temp\b068098f7a6a8004da08ba9691b6d178a85a6b31f86681537d49dee534b72dacN.exe 2C13CC2F70593C34C28CAAE66A6170BC06979CD6ED60B0F87587722848169158F03793F2FB4E4DDE8F967C4796D3D9B6CD1FCF3091087369EC78731C593BAA7C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B093.tmp

    Filesize

    4.4MB

    MD5

    594851879f4bc352311d32d21c491c3e

    SHA1

    ac98945049ae30f728e489094efe9b7f037cd660

    SHA256

    8f7a51ced7fb8778c5bceef2e7bed87beb77397636a1b8d455b28e137906cfea

    SHA512

    0efdd39a1d5ea5ae848e1a314be8f1ed015aec0adccfd0976ac3a8a5846f5542cc8ab9a35b6f680bc68128702398b7d5366fbba0f98f9f8a88a1003c6c9084e6

  • memory/3532-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/4816-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB