Analysis

  • max time kernel
    79s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 06:40

General

  • Target

    389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe

  • Size

    94KB

  • MD5

    ab2a0331aef1da1ddbdf12f221387d40

  • SHA1

    474a3c41e5f45168d627c4a1f1d7e01f5f371b9f

  • SHA256

    389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfb

  • SHA512

    d95b4ad72013a0bd6a8c368a70e0d569c1c5a5a4435e94afdac8594c6c256b4bb04c2f54a5b47c1fde8047e436289edb192bbce8cd33b6e7a00f1468d0152267

  • SSDEEP

    1536:Fha2oTUu7Ox8T5Ky1uwTfquRTKI+9t6pPMjMHUdWIuL2lB+KunXcD5JxEgJoM:ba2Pu7Oxu5Ky1uFuRTK1/8PMwHU+dn0K

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe
    "C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe
      C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe

    Filesize

    94KB

    MD5

    ee6ad9a2aeaf282652525c311919144b

    SHA1

    f373505bdf0d5588e3da3d576480cf362304ef9a

    SHA256

    f9fed1b362aa520a404ef446c4be7c6cdd797e52dae8d4fd4d82b065f06df98c

    SHA512

    507375f9b6ce4cc560daa111962c7d7da36f57fe6b0db1e33b307f486e9e5df6aecf199012d7138cdac89146eb788dc2aed2aedf20e031e32521ac2f9ff9aaf9

  • memory/1760-0-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1760-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1760-15-0x0000000000180000-0x00000000001B2000-memory.dmp

    Filesize

    200KB

  • memory/2152-28-0x00000000001D0000-0x0000000000202000-memory.dmp

    Filesize

    200KB

  • memory/2152-26-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2152-29-0x0000000000230000-0x000000000024B000-memory.dmp

    Filesize

    108KB

  • memory/2152-22-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2152-17-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2152-30-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB