Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 21:49

General

  • Target

    55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe

  • Size

    5.8MB

  • MD5

    1ad95eb77ba3af998763ee9a088f44f8

  • SHA1

    34fefdecc3eba4edfaeb7834cda89c25ada83a9f

  • SHA256

    55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754

  • SHA512

    5a08bbdf845a6397d86c5709c364ee454395971e30f75795b9bceb04a3c21367095a04fd570bfb229e631620f16124825c85c8daa8b0eb30a9f72f800cf94c03

  • SSDEEP

    98304:pbaZBcfUkR+MuXPNvSyVlgKXuz0IMMyAacwyCGCmNM1xSlHZSGEH:p+ZBcMPFXVlWz8PcwnGCPPp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe
    "C:\Users\Admin\AppData\Local\Temp\55106b95e3cc2e42da32175929dd9eee714a216d822271b0621f411a5414b754.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\AppData\Local\Temp\TLFReader.exe
      C:\Users\Admin\AppData\Local\Temp\TLFReader.exe 00000000
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TLFReader.exe

    Filesize

    335KB

    MD5

    b739b604eaaeaa4bedbdf86ce86a12de

    SHA1

    787be519d559ef46f1e1ab3f0a36ffdcfb55411e

    SHA256

    e36cc0d031e816412efc7e4ddec0e843ec3b3faaa31e88b95bdb07036960b102

    SHA512

    51ca94aed3fe487c142ef8159afa7559f0339273396705064182881258dd8d2e4fe9eee8d36a154d62de83f23f1735fa83e197ee19c4fe9f3440fdbe7b9a40a0

  • memory/1572-10-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-2-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-3-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-1-0x0000000000D9A000-0x0000000000DDF000-memory.dmp

    Filesize

    276KB

  • memory/1572-9-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-16-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-28-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-25-0x0000000000910000-0x0000000000EEA000-memory.dmp

    Filesize

    5.9MB

  • memory/1572-22-0x0000000000D9A000-0x0000000000DDF000-memory.dmp

    Filesize

    276KB

  • memory/1572-0-0x0000000001050000-0x0000000001051000-memory.dmp

    Filesize

    4KB

  • memory/1572-21-0x0000000001050000-0x0000000001051000-memory.dmp

    Filesize

    4KB

  • memory/1572-18-0x0000000000AEE000-0x0000000000BE0000-memory.dmp

    Filesize

    968KB

  • memory/4092-15-0x0000000004E20000-0x0000000004E2A000-memory.dmp

    Filesize

    40KB

  • memory/4092-19-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4092-20-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4092-17-0x0000000073ADE000-0x0000000073ADF000-memory.dmp

    Filesize

    4KB

  • memory/4092-12-0x0000000005400000-0x00000000059A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4092-24-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4092-13-0x0000000004D60000-0x0000000004DF2000-memory.dmp

    Filesize

    584KB

  • memory/4092-27-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4092-11-0x0000000000450000-0x00000000004AA000-memory.dmp

    Filesize

    360KB