Analysis

  • max time kernel
    94s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 23:06

General

  • Target

    a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460N.exe

  • Size

    93KB

  • MD5

    295d177b5942f9267e725d5eab8ddc50

  • SHA1

    16d2bcf3cb95be4f6490e7f8ba31404501b5b278

  • SHA256

    a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460

  • SHA512

    902e064f65d5e4888d7f3ee937e5d52ce12735fe502a91012a88b4593a63c7c2486796000f1e907c1d0464891b9895d77db12d017756342c35bb67bee5cc056c

  • SSDEEP

    1536:g+ZsZWEUwrR/AOyK2cbYDAg04eSX/HXhNmL/MI8/8RlYs+mxMqN/Xb8NI3546Ieo:0Uc9cc2F0yXyNl9DNvowpd5O

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460N.exe
      C:\Users\Admin\AppData\Local\Temp\a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a3e8443e6845254210cff210bd123e430eb5a5c9ba6b5fd69f50ebb3c32f6460N.exe

    Filesize

    93KB

    MD5

    3214c700f1fd971479e8e7da1c47d416

    SHA1

    a859b417f9f786fbd16b2183894f62793bdd7da2

    SHA256

    3e1c13b02e08d6ac3f17cdbccb17c9ab6b62cfe2c8ef1a0eaf2668dff314d1c0

    SHA512

    faaa1f692390a9b3399ce959b57a1e1611b87ed86ed07dd754827fd03c79f3b0c7409f07867ae68196f2e58576a201e10951d8176b55332216500e3f7c86b83f

  • memory/3180-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3180-14-0x00000000000E0000-0x000000000010F000-memory.dmp

    Filesize

    188KB

  • memory/3180-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3180-25-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB

  • memory/3180-26-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/5112-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/5112-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/5112-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5112-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB