Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 14:03

General

  • Target

    c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf.exe

  • Size

    274KB

  • MD5

    b1894bbfdba459ba9d7713ea80c25490

  • SHA1

    e6de5c265b2b8096b9f0026f4522b66793ce8d27

  • SHA256

    c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf

  • SHA512

    ffec399d44b176150c8e35b64147914ead0cb46a1f27e449b854d4936ea9fae342c67cd54345b9b008f6cabee8039695bd70e3964feaad683010712236755c23

  • SSDEEP

    6144:5oyqCRUTfoLuDk2/Xap6oRMyQcI2S0xfsLPw:5uCRU2LRTr9Sufmw

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf.exe
    "C:\Users\Admin\AppData\Local\Temp\c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf.exe
      C:\Users\Admin\AppData\Local\Temp\c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\c3976f87ebc6714bdc4716bffc2bc78fc71ca974f0c89bf28d8d45925f48f0bf.exe

    Filesize

    274KB

    MD5

    e5789b69d01068378f8d24c9e936fce0

    SHA1

    73f7c48f2a54d16ae69f552fd68b391d8065ace7

    SHA256

    d1e32c6a8258320d706e2e20c42553ed39cff2b42076f802819e081aac140427

    SHA512

    7ee54280cd8283b9158934f5c59bab3ba9edf5ee52de2086a6e47dc32d5f68ee5242a78686b8b92aafc19c875b04f588a7677edd939c51e50aeb2b63462cbca3

  • memory/2372-10-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2372-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2416-0-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2416-8-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2416-13-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB