Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 06:08

General

  • Target

    6f931f392190e906d97d292bae2e4830141f369b3544c458fdd9c5f41e105e00N.exe

  • Size

    46KB

  • MD5

    1054f2e57c95c2e475c62a03876546c0

  • SHA1

    7db72e4ec173aa4e5b77273a03817a3afbe07fe5

  • SHA256

    6f931f392190e906d97d292bae2e4830141f369b3544c458fdd9c5f41e105e00

  • SHA512

    770c53d6a78b72770d8b8809a054e5872d9c0f34ba86b850340dd7eecbdf4a13130e7bec2634bcdc010809ed120d00b27e3bbc0a886cfef8d3d4a0a0f28cc1a4

  • SSDEEP

    768:9Y8ZGkv7+1VV+om9CKfi7tJ/4BKh1bmQLxdU2+Hkl6mv/j4iY:6eGkv7+1W9CKfi7tJ/4wHvLxt+s6AjC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f931f392190e906d97d292bae2e4830141f369b3544c458fdd9c5f41e105e00N.exe
    "C:\Users\Admin\AppData\Local\Temp\6f931f392190e906d97d292bae2e4830141f369b3544c458fdd9c5f41e105e00N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\dittunu.exe
      C:\Users\Admin\AppData\Local\Temp\dittunu.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dittunu.exe

    Filesize

    46KB

    MD5

    1eceb1ba4df7deb1e85b0646b4532dae

    SHA1

    6f97601731409a7139fc513303b5fae6298d4520

    SHA256

    1415b829e026e2cedd4b8cf11ea9a1440a31fda0f835efd1155bc6de7385d900

    SHA512

    e5f91c37b77bd0840c4d3294743d8e067a1b0adcec2415c9edda307291d42b1b3fc4b000406533bf078a3a4a439c661dca7fb10cce8d326b5721137e7f5fbe94

  • memory/1684-0-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/3784-5-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB