Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 04:05

General

  • Target

    a58149adef85d0e951245a8fbe6461b4950dc3829250dc2c9a892db2f38959a7.exe

  • Size

    55KB

  • MD5

    067216f18d1e909d595d36fb136b2063

  • SHA1

    59cb0f70736ea97a97223f800e52803ae24bfecb

  • SHA256

    a58149adef85d0e951245a8fbe6461b4950dc3829250dc2c9a892db2f38959a7

  • SHA512

    8e75027a902693f90e475781b1b4f14ef7a8671ec83bb2f1edfe1369a17439569106dee4710c817775cc61f0403c7375bc21a536b6648a2e026c4e9111e03bc9

  • SSDEEP

    1536:TalEkKgJOyjc4oqULVJBoLmcYXV/O16nvaHWlUK:vbOHw5qLmcYXVlnvka

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a58149adef85d0e951245a8fbe6461b4950dc3829250dc2c9a892db2f38959a7.exe
    "C:\Users\Admin\AppData\Local\Temp\a58149adef85d0e951245a8fbe6461b4950dc3829250dc2c9a892db2f38959a7.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\antifahib.exe
      C:\Users\Admin\AppData\Local\Temp\antifahib.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\antifahib.exe

    Filesize

    55KB

    MD5

    d3deb6764d81d2b57cba89f439224647

    SHA1

    9de18e897cc5fed01b267f4669aea40951e3a395

    SHA256

    fb3e2247dc3db4495011eb59a1152d16cf3b0e2941f981afe4430c94d71b7bc5

    SHA512

    2b73dbef875d677abc0e8e0babada1066f2449008efcefa0f18ec501a541e193edd17b682ab47ca10b511379e7e7aa0b6ff65fb2ddaf49d6bd032802c02c0102

  • memory/2184-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2184-7-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2184-2-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2824-9-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB