Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 06:01

General

  • Target

    ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe

  • Size

    1.9MB

  • MD5

    de12eec84618da74ede7629208fccdeb

  • SHA1

    3b09b0e50645584d60f171306f5d22b84e7028e8

  • SHA256

    ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096

  • SHA512

    d418bd5fc3ac54c62e95b6672040779a89b59a502a5f7c45a51baf97bf79678b81a3669692d3f46ca6e0bb43383fb7251c8140aed43fbf1e0ad4595cd0e9fb95

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dfVtAJnGKe6yfe+a8P22lnQI/SGCtomrX7A:Qoa1taC070dbKnGKSe+aPU/3Cumb7A

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe
    "C:\Users\Admin\AppData\Local\Temp\ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\9C7E.tmp
      "C:\Users\Admin\AppData\Local\Temp\9C7E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe 49D824673D895524680716BFD94A9CCBC2F648508E9BFDC7898055A8E7B5E5FED86F778C68099E31E0BF96B2A2B5AF27DE85DB88A84A1064FC7DEE66AD034E2D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9C7E.tmp

    Filesize

    1.9MB

    MD5

    e604446eedc4461e99d4fdb19f00fcb5

    SHA1

    7e8f22b2396c74c2bae6b136ae7ec4b773e63e90

    SHA256

    4581326327a05674c10621a70f854b22a3c5931b96ebdb0ae7b8d73b7feec10e

    SHA512

    27c8856f14a76b76e701e4aa0009b559bbbccbda93d99b07fe1db69799f68e03820a0043657341a5be9044d2ee1305629642d6a860bb5d917bd9fe5fdd11c851

  • memory/2068-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2072-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB