Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 06:18

General

  • Target

    f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe

  • Size

    539KB

  • MD5

    68662e186e277f0efb92a2951467e930

  • SHA1

    c29bd6a07649732f443920626454ab85b947efc1

  • SHA256

    f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88

  • SHA512

    6b0a7b467de3553d1aba23feba977570742fd2b0320ef4ec10e81bc8072be22a14513a1339d14e0059b8523b086ccab7cac1ef135703de47ddc04cf3da18f23d

  • SSDEEP

    12288:Ld8dsHxFBLIX+NSKcNyBc18bCCwO+TalLF:LdfxjIX+svMcimCwO+TalLF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe
    "C:\Users\Admin\AppData\Local\Temp\f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\9ECF.tmp
      "C:\Users\Admin\AppData\Local\Temp\9ECF.tmp" --pingC:\Users\Admin\AppData\Local\Temp\f096ec64c6c690b723e890d1079dfa4d706b66627a833fe155d6bbd5516eeb88N.exe 811FF0E9A3C05371D0C180E160857E7261046CC50281474D382C37FC41B294C9BA64CB276C91950981C11972F4B0BF70F18EB38CC95CBAF85DB4401EB8E22A67
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9ECF.tmp

    Filesize

    539KB

    MD5

    8e5b72fe258684f3ab286b9ae19fd47d

    SHA1

    cb8f08863f4516838e7f6f63c4aa4e48057c4330

    SHA256

    f51ac8f3cef1eac25ca4864563b928e87f14fcc7b8f8294bb4f626d7b722a455

    SHA512

    d4d13356ced516bcebc6938b62675b404e36d6a33af05e1032d8754cdbbbc3d6f204329da29c026f5d19f275c4f7dade61d2bce24fb11645b5bf67a6c84fc20c