Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 06:01

General

  • Target

    ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe

  • Size

    1.9MB

  • MD5

    de12eec84618da74ede7629208fccdeb

  • SHA1

    3b09b0e50645584d60f171306f5d22b84e7028e8

  • SHA256

    ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096

  • SHA512

    d418bd5fc3ac54c62e95b6672040779a89b59a502a5f7c45a51baf97bf79678b81a3669692d3f46ca6e0bb43383fb7251c8140aed43fbf1e0ad4595cd0e9fb95

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dfVtAJnGKe6yfe+a8P22lnQI/SGCtomrX7A:Qoa1taC070dbKnGKSe+aPU/3Cumb7A

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe
    "C:\Users\Admin\AppData\Local\Temp\ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\CB2F.tmp
      "C:\Users\Admin\AppData\Local\Temp\CB2F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ef1f1ee14346cb0a4ea8238c105a09a5b096c178cfb0f8eecadbdaeca6a2f096.exe CD0003F878E643C954F89470556E2DBCC6B51FCACB8D8FC51C26538FAC2AC114AEA480A6F6D9BFD1F5772F7E26EE23A7902D16C07C1D0A4AA9DE9EC140745F2F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CB2F.tmp

    Filesize

    1.9MB

    MD5

    3d61699fc1cac7d2a9bc0106ef3553b0

    SHA1

    62d3d519c6bb771838c63620cc21317aea9d36b5

    SHA256

    12b1f84c4ca15ca145e2ac84e2c8545337efe102659d719e8db367bcb0d65716

    SHA512

    791b97f6184df8f33a003db731dc44556459190a309d3ed30ddbdbeb2094c146c2ffb812232cf048f4bb0853663c8aa0bf6e277a2e91a01523b7e66e10e42f49

  • memory/1816-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3688-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB