Analysis

  • max time kernel
    150s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 11:11

General

  • Target

    _中文版_TG_telegrnai_win_dows_ios_X_64.exe

  • Size

    98.8MB

  • MD5

    58decf192ba1ebd76fa3fe155fa05ea2

  • SHA1

    8285e9fbfe9615f46051a270336693d2ad996ee1

  • SHA256

    669db5bbaf621c8db4bda2973be525b8f2b61fe3345a7f80782dba3477361151

  • SHA512

    1a1413c9c676b86991490a95779154af2763300e0ac09206479b6302f21088279bcb7228a93c2a9ca8f6108e57d7cdc17d11da6700fe8eb2a4173ca9f93ffb78

  • SSDEEP

    3145728:6kidNrhao4YlScXFOC9+NbbuPfsArtK4eRKQBDKPFz4m9enGr:6kWnao4wtFf9TXXtZ8K8GPFsSeQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\_中文版_TG_telegrnai_win_dows_ios_X_64.exe
    "C:\Users\Admin\AppData\Local\Temp\_中文版_TG_telegrnai_win_dows_ios_X_64.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\is-DJ6CV.tmp\_中文版_TG_telegrnai_win_dows_ios_X_64.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DJ6CV.tmp\_中文版_TG_telegrnai_win_dows_ios_X_64.tmp" /SL5="$5028C,102853760,752128,C:\Users\Admin\AppData\Local\Temp\_中文版_TG_telegrnai_win_dows_ios_X_64.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-DJ6CV.tmp\_中文版_TG_telegrnai_win_dows_ios_X_64.tmp

    Filesize

    2.5MB

    MD5

    f71e7fd90a42b46788faca7381b0977b

    SHA1

    bf88f09e2e8764abe0022ed4dc2341fe60e82f68

    SHA256

    e1abdf4708ec615f6a8aaa24a8cfa0e9bf7af70046bc062c315ec6a270c062ba

    SHA512

    2da16431b745d5b96a448d85c5f11f31f863bb37a147735e63c5d98dacdd3e1f2501408d2438a0fc14927c8668abf63295e14a3bd09fb6a89730c6c6f5d0cd7c

  • memory/1460-0-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/1460-2-0x0000000000401000-0x00000000004A8000-memory.dmp

    Filesize

    668KB

  • memory/1460-8-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/2404-6-0x0000000000400000-0x0000000000684000-memory.dmp

    Filesize

    2.5MB

  • memory/2404-9-0x0000000000400000-0x0000000000684000-memory.dmp

    Filesize

    2.5MB