Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 01:38

General

  • Target

    9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe

  • Size

    4.2MB

  • MD5

    7ec8dbd4b0284b09eb91783491cfcac2

  • SHA1

    6466f8b448bb7ae0e0ba9e8c7feb2fc568c2cf77

  • SHA256

    9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144

  • SHA512

    ba691e6da8dbde6dd4ce9cb92e39c123d46759b2ccffad3e1e85616b342f20f124609b251823697a56f16638c6e89e4deb332ad0694409cbf1f7d53fbfd75a49

  • SSDEEP

    98304:Cmhd1Urye6skF8BgFPfvBHxCVLUjH5oxFbx:Cl4OBGnvHCVUjZEd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe
    "C:\Users\Admin\AppData\Local\Temp\9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\C707.tmp
      "C:\Users\Admin\AppData\Local\Temp\C707.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9f3b713f5d5cbf7956e2af70a7e45d08dc420ba93df0bb177137c2993fca7144.exe 6ADC34754A17BD5AF3A90C1D7642965D285355E92A29FC6F2EFD13604BCC7376E0BAE829308A198B7660E9366070DA1F6E289140CB25F19B5B2B9A72AE3BDA48
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\C707.tmp

          Filesize

          4.2MB

          MD5

          f8230ed3317482dedd37cf4838ff7762

          SHA1

          ef5160f022098c6135a87b48baad0ffd10608007

          SHA256

          799f582d19014d7d640903c2ed9b46151e19e8cf3f1e3816f4d6a4813cbd2135

          SHA512

          4e37240343b3fb05ef656505fb14f5e8febad1c696ad4e8510ad6f490641fe978579133d698fabc652934ef0ba7422622a7b86e61744e67c7e1557b912aa8d99

        • memory/300-9-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB

        • memory/2484-0-0x0000000000400000-0x0000000000849000-memory.dmp

          Filesize

          4.3MB