Resubmissions

25-09-2024 15:53

240925-tbmfsateqq 10

24-09-2024 22:03

240924-1ynqpa1dle 10

Analysis

  • max time kernel
    180s
  • max time network
    186s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 22:03

General

  • Target

    6ea14a4bfc5e802e358f14b4b7d2ce8e.exe

  • Size

    11.1MB

  • MD5

    6ea14a4bfc5e802e358f14b4b7d2ce8e

  • SHA1

    9bb2d7c7fda701f1481a843bb198c016e2486c4a

  • SHA256

    9578acb21ffdcc062586c11a87aab114a07dd0dbc66b440cb69bbeafb5634cc9

  • SHA512

    9a774bcbef9ed3bc050f5c3a1055a14dcc239ead07f40c7d8a21f632cd10439dad8d82f1b7ba0122ad11c6cca4f39ab7aaea329f3abae762438e2174c3f11e5a

  • SSDEEP

    196608:uOK19iyfvQgN9prpo/mOIGqBGyC4gDEz+twaXbTPlrLwXJYRliwZ7M91vNgkfJdP:uZbfvBgmMqCyTOVZLBgrU

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ea14a4bfc5e802e358f14b4b7d2ce8e.exe
    "C:\Users\Admin\AppData\Local\Temp\6ea14a4bfc5e802e358f14b4b7d2ce8e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/664-0-0x000000007440E000-0x000000007440F000-memory.dmp

    Filesize

    4KB

  • memory/664-1-0x0000000000290000-0x0000000000DAA000-memory.dmp

    Filesize

    11.1MB

  • memory/664-2-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/664-3-0x000000007440E000-0x000000007440F000-memory.dmp

    Filesize

    4KB

  • memory/664-4-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB