Analysis

  • max time kernel
    106s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 00:09

General

  • Target

    f470306ecc341bc12686d1c7b7404dccb544a610100bf579a56470a3a524dc65N.exe

  • Size

    29KB

  • MD5

    5f036a6f6427790c9dd3323e8b216a40

  • SHA1

    3ec9eaf3ab0805696ee882badb12a8a46ea07312

  • SHA256

    f470306ecc341bc12686d1c7b7404dccb544a610100bf579a56470a3a524dc65

  • SHA512

    08c1d9e308633d19cd98ae99c9946c4de985cce79745b1baf02824ceef12dd67894920acbf381c9b72f23584bb602e5a9ef7fc688639cfe458a5ef1f23f9b77d

  • SSDEEP

    384:2XHECP96wH/pIBhXFwMIQno/d63QJNUkXq0zk7Jyc/YexWnJSRHkC51iCcxSC1Z:2t/HqnIgAVzdEWJSaC0iTBbNM7ZonHq

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f470306ecc341bc12686d1c7b7404dccb544a610100bf579a56470a3a524dc65N.exe
    "C:\Users\Admin\AppData\Local\Temp\f470306ecc341bc12686d1c7b7404dccb544a610100bf579a56470a3a524dc65N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\Temp\fontdrvhost.exe
      C:\Windows\Temp\fontdrvhost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\Guna.UI2.dll

    Filesize

    3.8MB

    MD5

    846a7e5993282e220b26b82e7a39a40a

    SHA1

    e37fe15d2fb33753c042e16d1d008d412e7d99e7

    SHA256

    5613682635617cd43720807448f69b10090932e8571a358b92361d2a2c7a4597

    SHA512

    fcf608391d7f8406bb538aca0e9dafb804cceda6c590dcd98d684645bc3bfc0c1d43455a74854988b4b30e56a68ef8be886e92e993f1504b49f0e4baa1c0cc0b

  • C:\Windows\Temp\fontdrvhost.exe

    Filesize

    904KB

    MD5

    f41ddb7839baaf8afb9e06244cca63af

    SHA1

    a28a821a6259a502291085e606c3d6695f76b77e

    SHA256

    bb87be5fac469d9486bd959166ad1a879a361651450fef3ab4e23d89e387aac2

    SHA512

    d9af2a8786067027b3e13200f2102c3df58db236c3aba1f2b2f6adbd4de49e867991120f1afac9642e9d647c5e2c3f5da121f19baf9ec11bc441a0fb5f001421

  • memory/2164-28-0x0000000074ED0000-0x0000000075680000-memory.dmp

    Filesize

    7.7MB

  • memory/2164-25-0x00000000059B0000-0x0000000005F54000-memory.dmp

    Filesize

    5.6MB

  • memory/2164-26-0x00000000054A0000-0x0000000005532000-memory.dmp

    Filesize

    584KB

  • memory/2164-27-0x0000000005440000-0x0000000005452000-memory.dmp

    Filesize

    72KB

  • memory/2164-24-0x00000000009D0000-0x0000000000AB8000-memory.dmp

    Filesize

    928KB

  • memory/2164-29-0x0000000005670000-0x000000000567A000-memory.dmp

    Filesize

    40KB

  • memory/2164-23-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/2164-33-0x0000000006340000-0x0000000006716000-memory.dmp

    Filesize

    3.8MB

  • memory/2164-35-0x00000000091F0000-0x000000000922C000-memory.dmp

    Filesize

    240KB

  • memory/2164-36-0x0000000074ED0000-0x0000000075680000-memory.dmp

    Filesize

    7.7MB

  • memory/2164-37-0x0000000009C40000-0x0000000009CDC000-memory.dmp

    Filesize

    624KB

  • memory/2164-38-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/2164-39-0x0000000074ED0000-0x0000000075680000-memory.dmp

    Filesize

    7.7MB