Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 17:01

General

  • Target

    46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe

  • Size

    32KB

  • MD5

    0feac4769a979c684f50ac1eb0fb7a00

  • SHA1

    9b5f58a1c27d3570c9a324578b0e202a59a5d3ed

  • SHA256

    46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749

  • SHA512

    430021aa36770be1d363a90363f89b47e342b772081be8079709a0b6e99cfcfb8097c38329c12b23100358624ca40770a109f0eb2a3bf8e2ad2e3d4cf282935a

  • SSDEEP

    768:/8sJAnZCQBwuUuequ7UUK2xgl4sVZXLpbL:/8sMnlequpKwgrTXLZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe
    "C:\Users\Admin\AppData\Local\Temp\46b11ed42df73f173913d9d52f1fbb124786b598464edcd3dd610e57779db749N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Local\Temp\justupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\justupdater.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\justupdater.exe

    Filesize

    33KB

    MD5

    c2fac5561b5509fbfdfb2a4a7e385eee

    SHA1

    756205bd9bf16a2402e64781ab426a1b4dcde2ba

    SHA256

    65956ba2b5dcec963704a40fb4860457dc98eb0949f6f90835b9fe9b575bbbb7

    SHA512

    571ef9ce4e8ba8418bf6cacaa44ab3e07cf4e69fb12de9b64eb43624a4d5253657a78526f667ec6eaa8709e4e8a655f9f3c599c25ec52427ca8abf5acb724ce8

  • memory/1244-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2544-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB