Analysis

  • max time kernel
    93s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 03:48

General

  • Target

    $TEMP/DUDU_HH.exe

  • Size

    220KB

  • MD5

    0b2a860a558ca00e1b4f389b6d8be1e6

  • SHA1

    5e5a12756446751482d3db2798bd954f2f49ee68

  • SHA256

    81db7a9742cb8fb50f7a97a952388cb3f4a1a9d150bc84705f8c2abf2c71dafe

  • SHA512

    2210d69d467358c3174bf0685bd6dc1236d56aa9a19246c58931ebf87fe955fb4ed5e9acbb328b1775930e20fa275781c0eb48dd6d943de46ff20dc8fe511147

  • SSDEEP

    1536:OmcjI6qnGJWh7jtCY4d/2uXAEaTKKNZuYfoIRSPVOklNmUSxxbZl99JF:OHGnGAl5id+kQfJoIOVOklNmUSxx

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\DUDU_HH.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\DUDU_HH.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\remotesetup.exe
      C:\Users\Admin\AppData\Local\Temp\remotesetup.exe
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\remotesetup.exe

    Filesize

    200KB

    MD5

    431f73f47db54f39affaf01d059ddc19

    SHA1

    494a98579d991201f79bc62138f3614eba7a6bf4

    SHA256

    432ce523edf6eac5d01b085ebb8ccda80c16e72618ed4ef75312884b171fe281

    SHA512

    94d5f6d28dbb9934013b2908e95a69374fcb93384c8333807a7bcf437b6e3638bf1aad92e894fbb282c28eebdcbda770752f2e43d9c6c7ac9e892c647ccab79b