Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 05:42

General

  • Target

    964220a77b26b5d220d26fdd5a316bb56dba103f71bed72bb3dea93a5aaf0d89.exe

  • Size

    95KB

  • MD5

    a109188aa7f669cbbfab3c85fc4a10bb

  • SHA1

    efe5cf763d53bdd4092c861e7bc36749f5e0f8b7

  • SHA256

    964220a77b26b5d220d26fdd5a316bb56dba103f71bed72bb3dea93a5aaf0d89

  • SHA512

    8cbff2d31dad0fa7e20513bcb42f77f01b49945b8fabce5b8a5ab87b93743d300588a19f9d7137d0314de238a194923944682f1bf770c83d5c2d144fdacd0f3d

  • SSDEEP

    1536:4X+rXNP8VKosfkZVH1ruMu/MgdLeAyN0pfK8z0IsTYOBDDr2ICXrsSWkc+:4XK9qKo9bH1ruMu/MceAMW0IulhGrRWK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964220a77b26b5d220d26fdd5a316bb56dba103f71bed72bb3dea93a5aaf0d89.exe
    "C:\Users\Admin\AppData\Local\Temp\964220a77b26b5d220d26fdd5a316bb56dba103f71bed72bb3dea93a5aaf0d89.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nse38B.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    1d8f01a83ddd259bc339902c1d33c8f1

    SHA1

    9f7806af462c94c39e2ec6cc9c7ad05c44eba04e

    SHA256

    4b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed

    SHA512

    28bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567

  • \Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe

    Filesize

    95KB

    MD5

    a109188aa7f669cbbfab3c85fc4a10bb

    SHA1

    efe5cf763d53bdd4092c861e7bc36749f5e0f8b7

    SHA256

    964220a77b26b5d220d26fdd5a316bb56dba103f71bed72bb3dea93a5aaf0d89

    SHA512

    8cbff2d31dad0fa7e20513bcb42f77f01b49945b8fabce5b8a5ab87b93743d300588a19f9d7137d0314de238a194923944682f1bf770c83d5c2d144fdacd0f3d