Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 21:41

General

  • Target

    4355ebc8a769855f975058047e955c5079d82d259e1b58b0ca00e50f28dfa1c8.exe

  • Size

    59KB

  • MD5

    f8fdab75ded92b5751fb0be7a3f88b78

  • SHA1

    3d761ca88cf33f929052f16c95f86af1434e2ff2

  • SHA256

    4355ebc8a769855f975058047e955c5079d82d259e1b58b0ca00e50f28dfa1c8

  • SHA512

    8eba50490420585132d30badd656dae64a4bc95e9de6c16662e79eda856a1019688af2be7ba306a7a8970062930ebfadeda94e9ed9c407969c0c5ae9d33a0652

  • SSDEEP

    1536:9VdePelp2Xy+tuQOzOYE5aXPnoCwF8tmq6D64iN:mweqOYEUXPnoCBv6la

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4355ebc8a769855f975058047e955c5079d82d259e1b58b0ca00e50f28dfa1c8.exe
    "C:\Users\Admin\AppData\Local\Temp\4355ebc8a769855f975058047e955c5079d82d259e1b58b0ca00e50f28dfa1c8.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstCA43.tmp\inetc.dll

    Filesize

    31KB

    MD5

    5da9df435ff20853a2c45026e7681cef

    SHA1

    39b1d70a7a03e7c791cb21a53d82fd949706a4b4

    SHA256

    9c52c74b8e115db0bde90f56382ebcc12aff05eb2232f80a4701e957e09635e2

    SHA512

    4ab3b1572485a8a11863adada2c6ec01e809a4b09f99d80903c79a95b91f299b8f2cd6cceaa915567e155a46291a33fb8ccb95141d76d4e7b0e040890d51d09f