Analysis

  • max time kernel
    129s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-es
  • resource tags

    arch:x64arch:x86image:win10-20240611-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    19-09-2024 18:12

General

  • Target

    PO #86637.exe

  • Size

    1.1MB

  • MD5

    5b77c06c6cb2bd85ffd91363b9b94c8f

  • SHA1

    e6307c82fac4bb7fd757255afae7b7863a70dbff

  • SHA256

    b3d4552525fffc18e9f7ebeb7382b205c7bfffcd9db331f6b0bbaec71ccb5ef2

  • SHA512

    19ae2b4a1a5e70a6eed9b75d696f54dff1435bac0e423ab533625e2f3fff9e7074e850bf87dce7b97a008a18f72dba3c317e7744f4f43e13414b22aec5b14bb3

  • SSDEEP

    24576:uAHnh+eWsN3skA4RV1Hom2KXMmHap2AfB75eMzb0SC9VME45:Zh+ZkldoPK8Yap2AZLb0SC3Mr

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO #86637.exe
    "C:\Users\Admin\AppData\Local\Temp\PO #86637.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\PO #86637.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:5088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autE8BA.tmp

    Filesize

    280KB

    MD5

    c987493eacd91d156e25416647987616

    SHA1

    e07a0142c1cca4c3aae263500596a323afee4356

    SHA256

    a8cbf25b8e9ad51e3441315f7f0559328d54a74cf8ce54b6d7a3d35c29634041

    SHA512

    79ac0d6fecf7507c1e82a407dac9a6589c3da3bfdd475d832b3c4e71c98b9dff77df8a01d9ee530189dc5731f806151951aae748e6bb8c4420b85ea623079f4c

  • memory/2092-13-0x0000000001770000-0x0000000001774000-memory.dmp

    Filesize

    16KB

  • memory/5088-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/5088-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/5088-16-0x0000000003290000-0x00000000035B0000-memory.dmp

    Filesize

    3.1MB

  • memory/5088-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB