Analysis

  • max time kernel
    110s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 14:59

General

  • Target

    d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe

  • Size

    4.8MB

  • MD5

    fbd8d2918e14f2ecfda43a8f263ca070

  • SHA1

    202212ce1e1c17b8bac2724a2a318f93439a440b

  • SHA256

    d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336

  • SHA512

    c34f81a73fe8342a480e4c7cb17f040c90dc94a40442e62a6f28f058eb65ee10b47c0c1bcc8763d5750ffd2770d1a1d633fbebe46595d3e4005401da8a47c6f5

  • SSDEEP

    98304:ZwREbNDjVQhJBTSLRxudubttUlhtnrbeD8bJdqUMsv3SF:75jVITSlOuf2htrb7ysqF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe
    "C:\Users\Admin\AppData\Local\Temp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\is-ECAMA.tmp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ECAMA.tmp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp" /SL5="$40016,4117338,795648,C:\Users\Admin\AppData\Local\Temp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-ECAMA.tmp\d6d556cc828202b9126bd13a31677e4189b8476b36c5359e877e546113211336N.tmp

          Filesize

          3.1MB

          MD5

          9fb52fba6ccb2902b291c6d2d3a3d527

          SHA1

          10509d197f42ec69c7568953adb84c363468eba3

          SHA256

          8fedb63cc0faed06579d175d6437b8a9d1ccffacde27fd619d40cbaebcc36444

          SHA512

          05e61d9206cfbb38974492f9f322700a0d349cbfaa049dfc437cc681761ce69660af5aebac159ea5586577c1a5916d7592e43a21bc3918c18907fbc009b79b49

        • memory/1864-8-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/1864-12-0x0000000000090000-0x0000000000091000-memory.dmp

          Filesize

          4KB

        • memory/1864-11-0x0000000000EA0000-0x00000000011CF000-memory.dmp

          Filesize

          3.2MB

        • memory/1996-0-0x00000000013D0000-0x00000000014A0000-memory.dmp

          Filesize

          832KB

        • memory/1996-2-0x00000000013D1000-0x0000000001479000-memory.dmp

          Filesize

          672KB

        • memory/1996-10-0x00000000013D0000-0x00000000014A0000-memory.dmp

          Filesize

          832KB