Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 18:44

General

  • Target

    9fad31873e4dfc9a49788fd015320d3a47f4f6c1cfc519a6e99004814ca048b0.exe

  • Size

    559KB

  • MD5

    20712697c36274e470bcaf43a813e8fc

  • SHA1

    53da389ae9b176e2aa9ed49c098c79da120c14c8

  • SHA256

    9fad31873e4dfc9a49788fd015320d3a47f4f6c1cfc519a6e99004814ca048b0

  • SHA512

    e8c7ddad4d307f5a30ba8e63e53f8a59f4a8ae8e7324b7903ff741add5a0f57e0c54c0526838c8383f6c89797ac3cd8423905ac7b751037959e8e64c10d28630

  • SSDEEP

    6144:9JV10cTrk/mWVqwvzJR6QLW4/ih5QDyU+FM8cEOkCybEaQRXr9HNdvOaZm:5t+aQa4/cQDy06Okx2LIaY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 8 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 13 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fad31873e4dfc9a49788fd015320d3a47f4f6c1cfc519a6e99004814ca048b0.exe
    "C:\Users\Admin\AppData\Local\Temp\9fad31873e4dfc9a49788fd015320d3a47f4f6c1cfc519a6e99004814ca048b0.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5068
  • C:\Windows\Syswow64\d6500de8
    C:\Windows\Syswow64\d6500de8
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\d6500de8

    Filesize

    559KB

    MD5

    868c1d6d1dd207e3f19b2ab9dc960cbd

    SHA1

    f54591e5329cff02c48af5dce4c98803637af8bb

    SHA256

    5453b042007e51bf2dbd69d6ab5f83f748b8b27fccf3e1eb489f7e392e9ac161

    SHA512

    e77cb74471c8ad5efd41865d902ebf639148b68c53651dcac1463a8198e5ce01ab72b1ebae247df7f4539bc39aca5bdae307320b9ec868eef20f4ef629d6a31f

  • memory/1384-4-0x0000000000900000-0x0000000000991000-memory.dmp

    Filesize

    580KB

  • memory/1384-12-0x0000000000900000-0x0000000000991000-memory.dmp

    Filesize

    580KB

  • memory/1384-19-0x0000000000900000-0x0000000000991000-memory.dmp

    Filesize

    580KB

  • memory/5068-0-0x0000000000B60000-0x0000000000BF1000-memory.dmp

    Filesize

    580KB

  • memory/5068-11-0x0000000000B60000-0x0000000000BF1000-memory.dmp

    Filesize

    580KB