Analysis

  • max time kernel
    94s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 08:00

General

  • Target

    32c9e6423230449d68dc4cb4ed5fa2be66424314c63c5887759af2ca175d8161N.exe

  • Size

    4.2MB

  • MD5

    cc2fa611cc0c8a72cb3f94d1340608a0

  • SHA1

    511ea589eeb1e03a8f059ad0e6caef9b6fd7f488

  • SHA256

    32c9e6423230449d68dc4cb4ed5fa2be66424314c63c5887759af2ca175d8161

  • SHA512

    ac8ab3c42609e680fe27605d9baf7eabe62e0e7e1f2f4704be9bcc7f5bea1e3a916dac5086a722f1a7a36f13e1d366590c55c949801159a798922c01dcec64d4

  • SSDEEP

    98304:Cmhd1UryeExl/XShDLVLUjH5oxFbxhVLUjH5oxFbx:Clkxl/XgVUjZEdhVUjZEd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32c9e6423230449d68dc4cb4ed5fa2be66424314c63c5887759af2ca175d8161N.exe
    "C:\Users\Admin\AppData\Local\Temp\32c9e6423230449d68dc4cb4ed5fa2be66424314c63c5887759af2ca175d8161N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\83C6.tmp
      "C:\Users\Admin\AppData\Local\Temp\83C6.tmp" --splashC:\Users\Admin\AppData\Local\Temp\32c9e6423230449d68dc4cb4ed5fa2be66424314c63c5887759af2ca175d8161N.exe D3DBD409BDF5C36F56F50B62CA831A8D406D37E71CFCD198EB10369392770475AD21BC3E57EF255F1E4E441AECCBADC5301693BAE9A66B68FA3D32832A77184A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\83C6.tmp

    Filesize

    4.2MB

    MD5

    c863f824a9c6ad5c9ae33dfe7df7a015

    SHA1

    4bf8d2ed064ca7146142bfd76c0044e722d1e46f

    SHA256

    7ce4b0d04afc152183371db94d945b7cd1759d9b9e7ce8934850d0dfcbc252e5

    SHA512

    f6b9d5afff35d32dd7310d56959944d29cf152e3fa6f9a5eaa385fbacb8e56e756704126cc9f2afbe14167d576261b193f19de337d7c40d02c5eb846ca186f78

  • memory/1284-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2984-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB