Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 06:40

General

  • Target

    $PLUGINSDIR/$_287_/BI.exe

  • Size

    75KB

  • MD5

    36e5f42d4d498266464c407b58689c67

  • SHA1

    ca8eaa7b520ee881034b1c94b23d926d11f8aedf

  • SHA256

    b30ea88494e43ae40f879bc5c1c09ab810866b0f982eaf83a681da70e77880a6

  • SHA512

    f99361ec8beb0321388414eaaaec433bfda5a8cb91c9d488d9eb217132e69aeb99598e43fdc9423196f3cca4d8b776f150734c93950a9b8f09499232e83423e8

  • SSDEEP

    1536:UVdePelp2Xy+tuQOzOYE5aXPni9F8yggK0acQ2XzDv9:nweqOYEUXPni/v9

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\$_287_\BI.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\$_287_\BI.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsz8455.tmp\inetc.dll

    Filesize

    29KB

    MD5

    dccdcb124064a1d9a5eb12232348b898

    SHA1

    f294fac154cb1c6c18fe054ac584f767594b93fb

    SHA256

    37adc0183d94ae6ca1895643423dac0c97750d7103e6b00c14299dfc4ad2271e

    SHA512

    bd89bcd513bb7120db80e1115b4caceaa18c4ea863fe29b232002d447c3813133ff2849fcb2d4df45e3ff67e0e0d9d340d61060b9c74045b17efa5b1c1f5b05e