Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:31

General

  • Target

    eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.exe

  • Size

    1.2MB

  • MD5

    3b74107c1eb5bc06218b7d3227aeeb55

  • SHA1

    36f18bffa38953b0e8bd9182b5b8f922ecdd15a7

  • SHA256

    eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8

  • SHA512

    7507213fc722ce6c7e502ee686ff177bd523f826b95503b985333bba3b8db71bd17f128740c4ffe6bcee11f0c7aa976e3850cfaaeba40850afe0ff8638a1c97c

  • SSDEEP

    24576:ruOvHOWlcr7rxykJbO8pgMy/V9BS/7juT+MM+IJ621L4TK+ygRs7B/:aeJ0vxykJCKzyLifuTZkL436

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.exe
    "C:\Users\Admin\AppData\Local\Temp\eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\is-17PL1.tmp\eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-17PL1.tmp\eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.tmp" /SL5="$70068,1026433,54272,C:\Users\Admin\AppData\Local\Temp\eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-17PL1.tmp\eff6c5237fdc61573f74788656318d20711dc1620c632bc55cc4f7fcc5f80ee8.tmp

    Filesize

    687KB

    MD5

    c49b0148cb58b886f60cb32eb5e81439

    SHA1

    9c64093d08c5ea02a3622f2b616546d3c67a2360

    SHA256

    fc13f965789a342dba0784492c2e2797ab92bdeaa6532e125b04be81675c0810

    SHA512

    70968fa616ff38b39e9b266c38f99e4b25a749d5f84706c3302e2e218cfcf9b18cc8bd2017d630ed27fc7e291a748477f23bb9d447745654d06ca58845ea918b

  • memory/2448-17-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2448-21-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2448-286-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2448-289-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2652-1-0x0000000002450000-0x0000000002529000-memory.dmp

    Filesize

    868KB

  • memory/2652-0-0x0000000002370000-0x000000000244A000-memory.dmp

    Filesize

    872KB

  • memory/2652-3-0x0000000002530000-0x000000000260F000-memory.dmp

    Filesize

    892KB

  • memory/2652-8-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2652-10-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2652-20-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2652-290-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB