Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 06:22

General

  • Target

    9ed476bd1823f5421d9070aae36fcebf2f33cc9c6ea9f7e2b10f530ee7a1c09cN.exe

  • Size

    100KB

  • MD5

    235d78b10dfccbeaf9bcec9f3fa824c0

  • SHA1

    c0a250399634452b4e5c7059eeedfaff652559fd

  • SHA256

    9ed476bd1823f5421d9070aae36fcebf2f33cc9c6ea9f7e2b10f530ee7a1c09c

  • SHA512

    eff74c935e838c2b4151773f688d4e181f3a987a2e1dc64cc78acda5c26b532a0d0ca10f058a0f61327f2aac730843fa2fe62df1906c7b1d2a938254bc03aac1

  • SSDEEP

    1536:3f4exGDkeZ4mOoSgJEAJJCAXHNfECA1eLUq1scbJGjZ8V5ExivBr3NYh0D3:v4eYZ4+1JXJJCAXN8jq1s7eyUpzNE0D3

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 55 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ed476bd1823f5421d9070aae36fcebf2f33cc9c6ea9f7e2b10f530ee7a1c09cN.exe
    "C:\Users\Admin\AppData\Local\Temp\9ed476bd1823f5421d9070aae36fcebf2f33cc9c6ea9f7e2b10f530ee7a1c09cN.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    PID:1636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsoC257.tmp\InetLoad.dll

          Filesize

          18KB

          MD5

          994669c5737b25c26642c94180e92fa2

          SHA1

          d8a1836914a446b0e06881ce1be8631554adafde

          SHA256

          bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

          SHA512

          d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

        • C:\Users\Admin\AppData\Local\Temp\nsoC257.tmp\ShellLink.dll

          Filesize

          4KB

          MD5

          073d44e11a4bcff06e72e1ebfe5605f7

          SHA1

          5f4e85ab7a1a636d95b50479a10bcb5583af93f3

          SHA256

          b96b39cb4ad98f4820b6fd17b67e43d8d0f4b2667d50caa46eff44af245d75bb

          SHA512

          e9f99b96334764ae47aa026f7f24cfb736859a9131bd1c5ec7e070e830b651787f49910911f82e4ade0dc62fea0ad54ba210b07e44830eb2be6abb710a418a98

        • C:\Users\Admin\AppData\Local\Temp\nsoC257.tmp\System.dll

          Filesize

          11KB

          MD5

          00a0194c20ee912257df53bfe258ee4a

          SHA1

          d7b4e319bc5119024690dc8230b9cc919b1b86b2

          SHA256

          dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

          SHA512

          3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667