Analysis

  • max time kernel
    80s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 11:05

General

  • Target

    4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7N.exe

  • Size

    1.8MB

  • MD5

    aaa1151dafc7b710bae2335e9e5f8e40

  • SHA1

    d44745213115d76814745c1f9c7394377493d507

  • SHA256

    4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7

  • SHA512

    cdcaa115a22996ccd196af210d3f5a4fec9dd06c9215c4bc2e0cb36d8f505ba321cf6e44b49760760aa2390e10ca58ecd5299c7a67da0682904a615298a3addf

  • SSDEEP

    49152:YSGwG9ejgfVL4xl2zWgPyeBhbq4TTow+lsg:YKAL472hyeBhhTW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7N.exe
    "C:\Users\Admin\AppData\Local\Temp\4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7N.exe
      C:\Users\Admin\AppData\Local\Temp\4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:1728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\4782d811b18957a8e641a22b19f3c02df9ae656524749d52f2d23fc430c8eba7N.exe

          Filesize

          1.8MB

          MD5

          d0f8895aced2e1cc29bbf9df9774e385

          SHA1

          cc9ec956c5c8a778ec4e6f939e4e58b5877e4c07

          SHA256

          ba14bcc4576b66813f0439ce61016ddcb11c747c5ba164f0ef7574c0aba9793b

          SHA512

          471a3b80211478d52775f67cf62cf7c15c5df65169c3e2f2961529e7c2b5d966cbc86df03f2eb03494c81a135d587d0cdb28f7033816d84ba7cfca5a7b858f07

        • memory/1728-10-0x0000000000400000-0x00000000004F2000-memory.dmp

          Filesize

          968KB

        • memory/1728-11-0x0000000000400000-0x00000000004A3000-memory.dmp

          Filesize

          652KB

        • memory/1728-17-0x0000000002E60000-0x0000000002F52000-memory.dmp

          Filesize

          968KB

        • memory/1728-31-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1728-37-0x000000000D700000-0x000000000D7A3000-memory.dmp

          Filesize

          652KB

        • memory/1728-38-0x0000000000400000-0x00000000004F2000-memory.dmp

          Filesize

          968KB

        • memory/2452-0-0x0000000000400000-0x00000000004F2000-memory.dmp

          Filesize

          968KB

        • memory/2452-6-0x0000000003010000-0x0000000003102000-memory.dmp

          Filesize

          968KB

        • memory/2452-9-0x0000000000400000-0x00000000004F2000-memory.dmp

          Filesize

          968KB