Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 01:08

General

  • Target

    3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4N.exe

  • Size

    268KB

  • MD5

    a459a122715ec02a803d64382a345980

  • SHA1

    a5a2d4b0e71401c52daabfd02f6db412ad702aee

  • SHA256

    3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4

  • SHA512

    c85fa6358169e8e3f217111785cc2a2982231dfde7a32db3e036d4935077ed7175f6fdb0c975caa9087a0053f8184380e4ea772fdab5cf0cda1eb017b4fe0a8c

  • SSDEEP

    3072:VNaLfGu0rSTpKCwx/7c1S4AT4qFsBY9dtA7OjvGoEBFLb2QWpN:VEP0upK/x/0fATDFVtaiKF2QW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4N.exe
    "C:\Users\Admin\AppData\Local\Temp\3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4N.exe
      C:\Users\Admin\AppData\Local\Temp\3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\3799f4389c791e51570dd97301c884b49e7da42f527d86e25c525d0d917cc7d4N.exe

    Filesize

    268KB

    MD5

    ecd6b530bb58f0ba238f65ee28ee0a15

    SHA1

    7fb696adb906564bbc04e19dd4d168f9496a342d

    SHA256

    4981fabd1d5247e1104fba18d6c11956c296968583cc03ebf29345f9dee64828

    SHA512

    a68a56cf9927f8a81bf783e28383ed229981d3ea203862ab96ac85c60ea0e37d3d7470ca5a19f841109d0a7198bf60a49a18ae14532a888b647391e861d71daf

  • memory/2624-0-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2624-6-0x00000000002F0000-0x0000000000333000-memory.dmp

    Filesize

    268KB

  • memory/2624-11-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2680-12-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2680-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2680-18-0x00000000001E0000-0x0000000000223000-memory.dmp

    Filesize

    268KB

  • memory/2680-19-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB