Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 01:48

General

  • Target

    089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe

  • Size

    6.0MB

  • MD5

    e008b6098e06a8649a4b8571ffa49220

  • SHA1

    062a79648e77e6c9df6106ae7d76a3d5b7c75a6d

  • SHA256

    089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191

  • SHA512

    1619e44a66ed7d6be300d83cdc222130cd15334df0c486269ce4c3e333a8777869cbfb5ac6c38fe3291ca9f312e9a7f21bca517da780d39a7f394f1fd2583ee3

  • SSDEEP

    98304:emhd1UryefieQTqELFNMV7wQqZUha5jtSyZIUS:el/30qEE2QbaZtlir

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe
    "C:\Users\Admin\AppData\Local\Temp\089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\4FF4.tmp
      "C:\Users\Admin\AppData\Local\Temp\4FF4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\089a0811ffe41e30989ea7bf3042e2c73d5b79207828a14c93eb39d201377191N.exe 550C08E8076E6B1863BB9671734DD5B55A58F5F4966B17F8949366A93980AD1701D03146B9980480F66B6DBA08FE81326EE87B39AD628E9394948C22F596014C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4FF4.tmp

    Filesize

    6.0MB

    MD5

    2f99764c7d035931a1bc40c741f53f09

    SHA1

    dbe290c689b4a1d67f1e37cb78bf60784a0ce4ea

    SHA256

    f9c65079f8ef22a06eb7df56f0f8aec2026239c0494106c33a0da3c3d3194623

    SHA512

    a8618dcf4f2a20ebdff3bd94b186ea7011b6bbc0b91c540bd362a8c3b57275f6d59e3822a27e276a3a240e9619ee18ee966ec7202b3fdd841a654fa13d14fdf0

  • memory/1868-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2188-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB