Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 08:49

General

  • Target

    89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe

  • Size

    39KB

  • MD5

    12ff172401d1cdd16fa903efd04126e0

  • SHA1

    a86e56b1686c27ffb4a0647166fe36e5e8ef70c7

  • SHA256

    89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823

  • SHA512

    364dbeadec91d2bc3dd9202a3a1531348190aaa3509e42af206703d527c22968ecb39ef869a99b46ca242a43e2a4a3da2e663b24b1a0435b6a0cac0da2ec6547

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRC:bc/y2lkF0+BL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe
    "C:\Users\Admin\AppData\Local\Temp\89ae3e06a3bb19e4ff1eda9f7a6d67773a0e749026fbf2438d651cc307a97823N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    39KB

    MD5

    5df917b69c24d47a611e3b65acc9dc28

    SHA1

    f456f5348a8470f030a3fac0a5d8e72f161c36a3

    SHA256

    6a3768b042ae1dc574a997388706d6bdae72af3c2ccf1ab6a4f07417cd789767

    SHA512

    cdec25697eb43cfaaf943d86a3e7b4530bec90b53d476d3de7251628e6a1f9a4fc62c1a6cfd4456d30f5f382168e80bb68a997e898061ee4528284ead806c357

  • memory/1860-0-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1860-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1860-8-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB