Analysis

  • max time kernel
    78s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 10:04

General

  • Target

    0fb75f7ffdc6436d22f04c11ea57e0cc8b216867b79e061523322508e0fc9bb5.exe

  • Size

    1.9MB

  • MD5

    45908d7c585c53b55491658618f5700c

  • SHA1

    526ecbf2eaa50cb9a195e003177ca3bfabc7cac3

  • SHA256

    0fb75f7ffdc6436d22f04c11ea57e0cc8b216867b79e061523322508e0fc9bb5

  • SHA512

    1b4b3a2c030daf3ec9712741c750b16fdd1bf1775ed1320fd640c28a3eea68d1541f37622f439525fa587df9bd349d6d0cdad75b067b64ad7a908a1fae144588

  • SSDEEP

    49152:Qoa1taC070druz5yvg4OBio1LyD0YvJUgFFk5L:Qoa1taC0FyvHLotyD07gFFsL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fb75f7ffdc6436d22f04c11ea57e0cc8b216867b79e061523322508e0fc9bb5.exe
    "C:\Users\Admin\AppData\Local\Temp\0fb75f7ffdc6436d22f04c11ea57e0cc8b216867b79e061523322508e0fc9bb5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\36C9.tmp
      "C:\Users\Admin\AppData\Local\Temp\36C9.tmp" --splashC:\Users\Admin\AppData\Local\Temp\0fb75f7ffdc6436d22f04c11ea57e0cc8b216867b79e061523322508e0fc9bb5.exe 6086460AEF778CF30A49541739FC3EE4E356EFB039BD2BF0D2AF5C5F2D04CF9DB7C23F16CAC232B416A44635FA669DCE518AB1CD2733B853D5CC2878B9E078BA
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\36C9.tmp

    Filesize

    1.9MB

    MD5

    3a07f9693319c6baca74038814ad12a9

    SHA1

    3b16c1944233bfa8b3c46d284e9d7a3e0fcfeb47

    SHA256

    34c2135ddfc5ab87b0d317a9f2b5e81477cda573a8c2093774794d366f2e7a48

    SHA512

    1d1f30095f3441dce1182db5f7a990578ef4a7c3054f4da93852108ebd9b2bb9bb8d8df711d0f1f04d7a691f7f71895c620cb07f469c477cf340a6430d8ab325

  • memory/2880-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3032-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB