Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 06:31

General

  • Target

    7a89b5c1fd010a7fd2e9a9fdc3187156123f7eb439e9db018f69259645215fd9.exe

  • Size

    1.9MB

  • MD5

    bd8722293b3961c4ffaf0c116758c8f8

  • SHA1

    8e4c1ddc308f4693caf7ae550cc4858858f1001c

  • SHA256

    7a89b5c1fd010a7fd2e9a9fdc3187156123f7eb439e9db018f69259645215fd9

  • SHA512

    08a41191d2f6c24a15a78d58793b5c71724b8249edf642042ea241fe2805990f870a4322c350f57bc9d2aecf2bbbaa40c5aec3aceca38354b903666e8203750f

  • SSDEEP

    49152:Qoa1taC070dzYFMXViKhmQAqzOpxhNupJKDE:Qoa1taC0WPBmbqChNWv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a89b5c1fd010a7fd2e9a9fdc3187156123f7eb439e9db018f69259645215fd9.exe
    "C:\Users\Admin\AppData\Local\Temp\7a89b5c1fd010a7fd2e9a9fdc3187156123f7eb439e9db018f69259645215fd9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Local\Temp\7119.tmp
      "C:\Users\Admin\AppData\Local\Temp\7119.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7a89b5c1fd010a7fd2e9a9fdc3187156123f7eb439e9db018f69259645215fd9.exe 2ADC8BE86E9916DE2B099EB51149E5ED16747444B8E75A2CAD175DE8D029C89D25D5C9E9E2461FEFC1D68AE8668C88AF764F732D4FD790DB0B4C1EFEC0A6CC34
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7119.tmp

    Filesize

    1.9MB

    MD5

    996fd81d65eb9d41d003d87cf15eac99

    SHA1

    3e5e84f93975a58f86423ab1337dca338c0d7396

    SHA256

    3d89875feff47b8bcdf0dfb76b4d0f3de2fba3cd7fcdac079150739366c8d12b

    SHA512

    0330c17cfe89f6f043e221f238ebdc67e94e91abcf9524e80d21501af8600cc8dc8fc00ee3e8ce381266a21221fe141cb3d16df75511d76b5ef742fce7dd593a

  • memory/652-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3192-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB