Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 01:11

General

  • Target

    210a27e6bd9e8a820d361e9014426da3bcd43e3e3ccf80feccbc547ebfb7ee10.exe

  • Size

    1.3MB

  • MD5

    603232c15a3d52fb1bcadc982ca6c17e

  • SHA1

    ad6754fac0a55dc7f9f40e4e23d17315a188bea5

  • SHA256

    210a27e6bd9e8a820d361e9014426da3bcd43e3e3ccf80feccbc547ebfb7ee10

  • SHA512

    607cb360d7ad384a6a4c0a9686f15bf28c9f01c534985f0c55716fe01e04b73f91f7ac464abcff12ffcd1ef16ff76bbc179582278b3be244c30cdf63835ff111

  • SSDEEP

    24576:ffmMv6Ckr7Mny5QLOI681hmbExxWqOCH+i2v0LK//:f3v+7/5QLOz81hwEx3OCH+SW

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\210a27e6bd9e8a820d361e9014426da3bcd43e3e3ccf80feccbc547ebfb7ee10.exe
    "C:\Users\Admin\AppData\Local\Temp\210a27e6bd9e8a820d361e9014426da3bcd43e3e3ccf80feccbc547ebfb7ee10.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\210a27e6bd9e8a820d361e9014426da3bcd43e3e3ccf80feccbc547ebfb7ee10.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/536-3-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/536-4-0x0000000000A60000-0x0000000000D63000-memory.dmp

    Filesize

    3.0MB

  • memory/536-5-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/536-6-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1320-2-0x0000000003DD0000-0x00000000041D0000-memory.dmp

    Filesize

    4.0MB