Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 06:49

General

  • Target

    86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe

  • Size

    15KB

  • MD5

    ab56044b4cde9fc899318faf394917ba

  • SHA1

    41c4a9f07243b16762727c837415d81927be3366

  • SHA256

    86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926

  • SHA512

    2fa759a8066b52a6cda79813428bee936b4214f40d593625860e244b4d0bb7ddca08af3483a8c81bb6f179c1f21bc478fba4fa14b72b73e53d58f38ffa4db8e4

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYvAD:hDXWipuE+K3/SSHgxm4D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe
    "C:\Users\Admin\AppData\Local\Temp\86e8d4fe4ac7578c1ddfa31fdd2f1e0a62e3b31efa4f5f402ded2e2e86323926.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\DEMCCB1.exe
      "C:\Users\Admin\AppData\Local\Temp\DEMCCB1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\Temp\DEM21F2.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM21F2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Local\Temp\DEM7733.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM7733.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Users\Admin\AppData\Local\Temp\DEMCCF0.exe
            "C:\Users\Admin\AppData\Local\Temp\DEMCCF0.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2360
            • C:\Users\Admin\AppData\Local\Temp\DEM228E.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM228E.exe"
              6⤵
              • Executes dropped EXE
              PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM21F2.exe

    Filesize

    15KB

    MD5

    d21a5ae481058fcb35c3e7ca5b881152

    SHA1

    6930b5590b2aa48939613ec6b58d5d2cd944051d

    SHA256

    1182081578ebf48309f2c77282f0a0eb8953008ebdff2dc7f9632b15c567fe6c

    SHA512

    561be8a82af0a5ab77a2340fb08046461b7314672748e82f5fbec2e52842f0b2fbf93b3b2c58448f01a3ff2651c1a959e1bb2f751443290cb07f76e1d808a66d

  • C:\Users\Admin\AppData\Local\Temp\DEM7733.exe

    Filesize

    15KB

    MD5

    36a593e10e0db2a7150a17030b6b3f82

    SHA1

    043fca05a35399d6733a46c0ea674313adccf9cb

    SHA256

    43e00ed3dfd651084dc79cb8223e7ee5a906efafdb450132ecb880bf214b6329

    SHA512

    388f767ba3ed1a12d680d5b61554651cfa2efc2507adb8b986a430b7927f164f59cb088ab1ac3ac17b740b88929a845bdef2b0f2a11b3d287af624ca7806a82a

  • \Users\Admin\AppData\Local\Temp\DEM228E.exe

    Filesize

    15KB

    MD5

    25d6ff0de38297471e94d50e8a9e586b

    SHA1

    68aefa688270b5fd67f3d505b1ce3ab47544493f

    SHA256

    ed1938ad9a7c29aae39e682b121ad6c40b3d2c2360c1c645691cf1d71d91101c

    SHA512

    ae6dfb1b42d297e8cc7f1e93076fdf497ab168badc9901b5bbfc977af8ac5cf7f5a8c7feaf59b1c7f6c5c7d13cabc1d927cc5aa47088f22fc2b3534f8d4cb876

  • \Users\Admin\AppData\Local\Temp\DEMCCB1.exe

    Filesize

    15KB

    MD5

    58a2c25f502e1d400e05d2b21fc80163

    SHA1

    f87913ab9ebd5c9149e6b265d73dd29149e7f253

    SHA256

    265151e2df8107206f8e1ba99e044076b349c2932478cb9d355fe951ac0cc603

    SHA512

    09332619025c31deac161325842ae6136601c6ed48e43d966c856440f4764ec9305309f161696a177b446b481989d4b2c55706b7d4f6ffeffa959d8bfdab0e9a

  • \Users\Admin\AppData\Local\Temp\DEMCCF0.exe

    Filesize

    15KB

    MD5

    6086fd30690ecd424da160f7edfcf739

    SHA1

    3d6dbff3250ac69fa275008731e950d7f9100e27

    SHA256

    d657c0a44f4ead24de0ef4cdba4a859b2ff11735182fe4e4d8c4f344612a7ecf

    SHA512

    71d5ba7bb120134ccb472c6a78391d744c1d6e878b9685591bdc75c66c9b08bacbef508ec56219533882f5ced085ed3a21d929aea6b49f58faf961045c4ba491