Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 10:01

General

  • Target

    193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe

  • Size

    1.9MB

  • MD5

    68bf0594c0ecc1b3658c0874ea5f0db5

  • SHA1

    78a8d3ac2795e0480c8a2751a07d9637e1ab6c05

  • SHA256

    193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270

  • SHA512

    c72c44d08973459e033799300fc912f5b517e46a7efd4434e1d195dcccdece9ba7b6d04734e2e3ba83d5fae819db216b649ac22af71740692b067af5d0ab6b4b

  • SSDEEP

    49152:Qoa1taC070dE2LM30MjlMfIITJurtF9Z3d:Qoa1taC0V2LM02lkPUrrvd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe
    "C:\Users\Admin\AppData\Local\Temp\193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\9C40.tmp
      "C:\Users\Admin\AppData\Local\Temp\9C40.tmp" --splashC:\Users\Admin\AppData\Local\Temp\193d205c323f28a9b58c48b8f7272bfa7b2905b1ffb6d665f8e35a61ad470270.exe 969E5BE158A4D84DB6E6704A2E412437DC4D47A5B38EB718B16BAEE44E6056DD8663E6DB25E0B696EB18ADA2A763806097716722418697DBA95A882DFF14FFE1
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9C40.tmp

    Filesize

    1.9MB

    MD5

    3f8e1cf48820b362252cb5cc74242bd7

    SHA1

    7d21d427fe396f69e0ae19d424d036a193676f8c

    SHA256

    35e0ac02fc713147bab47029feaecfd789dd21a6922e9479d1260d37c1597266

    SHA512

    e44650e2aa28ddba2b4140b48828ce5e37ebed8d4573db937921e12202ade8cf97637ffc68e5c4b73df535c9d5ec18e104ef88413ee35e7e05a4d6f029d6df25

  • memory/1584-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2684-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB