Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 14:45

General

  • Target

    3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe

  • Size

    1.2MB

  • MD5

    dd888983c289f26094548b42ac5b6c85

  • SHA1

    a1893cba8b45a0294340419f03e05140f0b62c3b

  • SHA256

    3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d

  • SHA512

    e84aeb3aa9749b6a7d9cfd1f753c02fc87fdf8754c46e7295c1391e62273ce57c135a09519499b88d76655597b4d66c378a5086c10bcf413ba6ce69f66b8e42c

  • SSDEEP

    24576:9tb20pkaCqT5TBWgNQ7aQBXc9A9HHYLnPh2VQ7hxtf6A:uVg5tQ7aQm9BjZvF5

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe
    "C:\Users\Admin\AppData\Local\Temp\3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\3eace816daaec69a4652ce191c0369a0ce5aa933a38d68996e089e8949e46c3d.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\intemeration

    Filesize

    280KB

    MD5

    6312be8e131d2b7342ebdd0c1e4fe151

    SHA1

    2607a0c691260292b0a5de028e22b183f22a2617

    SHA256

    cd3e6b088ebb686fcffa7025668ebe9c550a5fa2f1aac8a669d571496cda792f

    SHA512

    c50cb856e077ec3fdb0ed5bc58132aee9519d07587b1e4971db57583f217d19c1b1255e91e0bf5c02399d2e3c8c35922f9f3667d6d31b07cff5a937e2994adc3

  • memory/108-8-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/108-9-0x0000000000720000-0x0000000000A23000-memory.dmp

    Filesize

    3.0MB

  • memory/108-10-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/108-11-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/824-7-0x00000000010D0000-0x00000000014D0000-memory.dmp

    Filesize

    4.0MB