Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 06:40

General

  • Target

    389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe

  • Size

    94KB

  • MD5

    ab2a0331aef1da1ddbdf12f221387d40

  • SHA1

    474a3c41e5f45168d627c4a1f1d7e01f5f371b9f

  • SHA256

    389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfb

  • SHA512

    d95b4ad72013a0bd6a8c368a70e0d569c1c5a5a4435e94afdac8594c6c256b4bb04c2f54a5b47c1fde8047e436289edb192bbce8cd33b6e7a00f1468d0152267

  • SSDEEP

    1536:Fha2oTUu7Ox8T5Ky1uwTfquRTKI+9t6pPMjMHUdWIuL2lB+KunXcD5JxEgJoM:ba2Pu7Oxu5Ky1uFuRTK1/8PMwHU+dn0K

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe
    "C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe
      C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\389f2e93ee2dd885a80e94bc0df1be5d37f76b20cbacf5d98c7b59d4f53d7dfbN.exe

    Filesize

    94KB

    MD5

    bb12d627c52b0e88292ff3f5dac40626

    SHA1

    ac8b96dad33209782c2b8f82996a1b104b598408

    SHA256

    a697a1c4138bf614a07e78e7d15f8a43b150c153bb2810269c536adc20f083f6

    SHA512

    15755c1de8eaf5daafc5ca5fba273656884528a00ae306176ef5d343020d0f90f76d390f163eb5c6b65a1305396cdc560cd9ff3d4451574ef4baa1d7b1646c5d

  • memory/1172-13-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1172-14-0x0000000001440000-0x0000000001472000-memory.dmp

    Filesize

    200KB

  • memory/1172-25-0x0000000004DB0000-0x0000000004DCB000-memory.dmp

    Filesize

    108KB

  • memory/1172-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1172-26-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1356-0-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1356-1-0x0000000001510000-0x0000000001542000-memory.dmp

    Filesize

    200KB

  • memory/1356-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1356-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB