Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 09:06

General

  • Target

    5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe

  • Size

    1.9MB

  • MD5

    6c35543ffdf0063566d7a1422f894855

  • SHA1

    4fef40337fcb757a059d2bcf3ef6bb3629a4066b

  • SHA256

    5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366

  • SHA512

    1f5e5c4b20e4faedd9f97d11287edef9b52acff11669ff9a5b78f42ed1191c1cbc480e6023f1cef1c429721e4e5cf8047347f8e6bc640e55ab4cc7951ceca07f

  • SSDEEP

    49152:Qoa1taC070dEkmXiFPY9o5ikDIPfvt4acv:Qoa1taC0vkmSFPYo5PDInV4acv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe
    "C:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\9589.tmp
      "C:\Users\Admin\AppData\Local\Temp\9589.tmp" --splashC:\Users\Admin\AppData\Local\Temp\5b86a1ce173aec377a2863cd69859ed02381b6c45b7caef666070facf6859366.exe 07ED78866F8E0E26C49E516B711CE27CA4693DD48989EA6376B9B25EBB0B085CD8D3065B044C69C3C52104E5B549E0AFD721BD3AC21DB8F4E2BC0B1163EE0BD4
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9589.tmp

    Filesize

    1.9MB

    MD5

    013d20d543813374fbae5bf1d70e87bb

    SHA1

    740bb19f7d30e971cd57fb73f08362cf34293585

    SHA256

    2fe6cb23801d3fafd3c5cf512931828fcbd33c7e957615fdb373956aad6e9e5c

    SHA512

    9fc9ba2643d94229f380033ec07e9917f064b604812d02d9e08adb778b3b3e46d446b7538586c79a7c233b6095683f6d0f892cfb11ce2b237795c0e8160ad3bc

  • memory/3144-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4052-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB