Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 19:20

General

  • Target

    2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe

  • Size

    50KB

  • MD5

    6f3334d809c5ddc67265e9d12f2ba795

  • SHA1

    2e18336b2425afb6807d314afc19d81d4c1257eb

  • SHA256

    2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da

  • SHA512

    dbedbd63511685563b1a585d61280b76e5a6f5302ad38633c005c783355df47527741e4d341f0d84c0485e54538b2d50c65f8e6c6295311178038f1d10133648

  • SSDEEP

    384:EqXJhMCEfgNfxAwMRGnkXF2MTNeUGpPdMYbsd/PwIsyUbSZBAPn2+qvX97yozJ:EsJhM/44Ak12M5ezNG/2rb7vqV7Nd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe
    "C:\Users\Admin\AppData\Local\Temp\2ac3230755227060072f4002107f2a160b88fcd71be150f34726a4e9adc884da.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\wujek.exe
      "C:\Users\Admin\AppData\Local\Temp\wujek.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\wujek.exe

    Filesize

    50KB

    MD5

    a1b40ba55df4c406c868bcfb9fa2796d

    SHA1

    02670e06de5b3b344bcc1a6495ab353eb53d5578

    SHA256

    1e6e996988d45a5ab7ae2564cbaea9800ffbc6f37871bd247ca74c0ea9162711

    SHA512

    e11eef68ad0a22e74ffb365afedc6df3a6d2a652d62ec817c5dae3487a1643b9dd939a0e17ca241e1a15bd8bbe71f1588fda21e268812c6f5105673a6a262980

  • memory/2340-11-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2668-1-0x0000000000403000-0x0000000000404000-memory.dmp

    Filesize

    4KB