Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 04:10

General

  • Target

    702d2a0486d27443dbab59b7eed43fec7679596678976c73a37ce4fe5ccda48d.exe

  • Size

    4.7MB

  • MD5

    549270da78bd70b2a24b36f2bd862793

  • SHA1

    002e866313e1b66af7ede526a0e88242d7643442

  • SHA256

    702d2a0486d27443dbab59b7eed43fec7679596678976c73a37ce4fe5ccda48d

  • SHA512

    ed2dcfc10fd15d2723236232c29476153dc5a827892c8835ca5223baf5ffaa069c428906caf7eb15b3d6be144c5daab540ab9e013d44eb528e97e111e01f4fe2

  • SSDEEP

    49152:kTGkQv5QZuTtS0rQMYOQ+q8CEM4xTG4QPTGHQ29KFeMD///5:kKkgWsM0r1QnoK4GKHJ0FeM///5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 18 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 13 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\702d2a0486d27443dbab59b7eed43fec7679596678976c73a37ce4fe5ccda48d.exe
    "C:\Users\Admin\AppData\Local\Temp\702d2a0486d27443dbab59b7eed43fec7679596678976c73a37ce4fe5ccda48d.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2796
  • C:\Windows\Syswow64\e3bbfdb
    C:\Windows\Syswow64\e3bbfdb
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\e3bbfdb

    Filesize

    4.7MB

    MD5

    4fa7bb797c36c24e92f1df741b600581

    SHA1

    933d6832ba01e3a91938f85b228c7618edff4369

    SHA256

    f781f1f79e1aa55f2fa6e92562cabd8fc5ac856f53d513091d5ae6a2cacbb619

    SHA512

    62bcbbeca31ee4b00bd8a4a05c4dcaaba15d6b5947b175607582e5b819a819bfbdde18706f6cda08dc79d4d3527bdde9c78617af7357ef46b013c15265d7aed7

  • memory/2796-37-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-16-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-0-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-45-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-48-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-49-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-52-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/2796-59-0x0000000000E50000-0x0000000000ED9000-memory.dmp

    Filesize

    548KB

  • memory/3612-4-0x0000000000E00000-0x0000000000E89000-memory.dmp

    Filesize

    548KB

  • memory/3612-18-0x0000000000E00000-0x0000000000E89000-memory.dmp

    Filesize

    548KB

  • memory/3612-22-0x0000000000E00000-0x0000000000E89000-memory.dmp

    Filesize

    548KB

  • memory/3612-38-0x0000000000E00000-0x0000000000E89000-memory.dmp

    Filesize

    548KB

  • memory/3612-42-0x0000000000E00000-0x0000000000E89000-memory.dmp

    Filesize

    548KB