Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 10:38

General

  • Target

    58a1121b51a4e481398c13c03de9cd25124f10294f5353d8c7e923c2bcb4b4a1N.exe

  • Size

    5.4MB

  • MD5

    e62bda4ee9aa9b049f09b0058c58baa0

  • SHA1

    86c6f03b7c1857529e0ec25bad4016378488279d

  • SHA256

    58a1121b51a4e481398c13c03de9cd25124f10294f5353d8c7e923c2bcb4b4a1

  • SHA512

    127a7e4cb2969d9ec8f09a2ba9cf8e8e81ab7f87a249ba6dfd5d4484443bfb929bfc91dc6412489bc0b4beb03a9516c5b3f7ce1c685dbbc7cc2a8ecdcbde913f

  • SSDEEP

    98304:emhd1UryeWCOaKs1pAB9hV7wQqZUha5jtSyZIUh:elPrKs4rh2QbaZtliU

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58a1121b51a4e481398c13c03de9cd25124f10294f5353d8c7e923c2bcb4b4a1N.exe
    "C:\Users\Admin\AppData\Local\Temp\58a1121b51a4e481398c13c03de9cd25124f10294f5353d8c7e923c2bcb4b4a1N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\C3CD.tmp
      "C:\Users\Admin\AppData\Local\Temp\C3CD.tmp" --splashC:\Users\Admin\AppData\Local\Temp\58a1121b51a4e481398c13c03de9cd25124f10294f5353d8c7e923c2bcb4b4a1N.exe 504ECC8C91C39124A475FDE87771238214F38BA5EB635E281B4E94044AF08A9393C98574C11BE315DC5F8B7D57DE323964FE008881954F201DDE1675EC0921C8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C3CD.tmp

    Filesize

    5.4MB

    MD5

    dd45326cbe22bce50e835c1d3d914261

    SHA1

    5ee5dcab49622c3dcc9391d992b554cd2d0a33d7

    SHA256

    5292aabd4334e88af2f4fdb8e84c63d33bdd9c25dd1a4350a26b9c9bd53efc54

    SHA512

    de44f67f9353a9abd463ec54bbed1ff3f7ae71fa4079b131ddf8e2cd4d14535dedc32a8613366ba06b3e19dab0d2b18e809ce4de8140ef828047f21e71edd3fa

  • memory/2252-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/3400-5-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB