Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 10:34

General

  • Target

    $PLUGINSDIR/$_287_/BI.exe

  • Size

    75KB

  • MD5

    74cb7b0a801435c552d3bfd1517491a1

  • SHA1

    a46e6e1b524a608eed9e81fd7e102e280b2e95c1

  • SHA256

    fe0af5e14e37fd0b642aa08495ae63a4ed441c92909dfd7a8a25a050b5ed097e

  • SHA512

    fce908fce3e9f84740280af53813bcbed29abf3f976a2b6ba1c88a722877ce020241b36bd0cbbb4f793df9d262b413ad30198bb1e8345128b0ac5857209b3260

  • SSDEEP

    1536:wVdePelp2Xy+tuQOzOYE5aXPni9F8yggK0acQ2XzDv6:rweqOYEUXPni/v6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\$_287_\BI.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\$_287_\BI.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsp8501.tmp\inetc.dll

    Filesize

    29KB

    MD5

    dccdcb124064a1d9a5eb12232348b898

    SHA1

    f294fac154cb1c6c18fe054ac584f767594b93fb

    SHA256

    37adc0183d94ae6ca1895643423dac0c97750d7103e6b00c14299dfc4ad2271e

    SHA512

    bd89bcd513bb7120db80e1115b4caceaa18c4ea863fe29b232002d447c3813133ff2849fcb2d4df45e3ff67e0e0d9d340d61060b9c74045b17efa5b1c1f5b05e