Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 10:09

General

  • Target

    ddcb5cfd2474fd13afc7d4eafc61f7fc41112556cd4752909b35b42aaa7449ca.exe

  • Size

    1.9MB

  • MD5

    6e1da04c49d87fc83242e73a0b4ed7db

  • SHA1

    6469ee9b626f73ab39d2c81b2b3d33cd84483afd

  • SHA256

    ddcb5cfd2474fd13afc7d4eafc61f7fc41112556cd4752909b35b42aaa7449ca

  • SHA512

    b105bcb56a5d025686079b02c703498be3a620f1def05f1c597ad49e834e62b3d52186ecc4be8ebce4a1b0983e38e1838ae66950b98a5c81937cc73703a44a8b

  • SSDEEP

    49152:Qoa1taC070dRlpSkKSi1X8/k+72bGftigWM7:Qoa1taC0EjtPiX8/eGtig5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddcb5cfd2474fd13afc7d4eafc61f7fc41112556cd4752909b35b42aaa7449ca.exe
    "C:\Users\Admin\AppData\Local\Temp\ddcb5cfd2474fd13afc7d4eafc61f7fc41112556cd4752909b35b42aaa7449ca.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\A0C4.tmp
      "C:\Users\Admin\AppData\Local\Temp\A0C4.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ddcb5cfd2474fd13afc7d4eafc61f7fc41112556cd4752909b35b42aaa7449ca.exe FA91D11AF258571CD00530952B2DFF9E4B94C377E53B826D57F7A962FF032E3E2645FA8800EAFC552BD46855E6284C2B74C9CD3F46BE216309297AED92B15430
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A0C4.tmp

    Filesize

    1.9MB

    MD5

    056b2a3c0a6ce2c3d658c09801f4e96c

    SHA1

    dacb782dde06254424e2df87c9ed008d6ace151e

    SHA256

    22ac54c421cc7ed8fb04fdf9f8d0a11a96aa8d55ac59ca1443d309940126327c

    SHA512

    fd8cf45d5594436d44b82b07c3eb29a97f7e47d87e3c164ec59aac61d62907051cb2948dd20ab6c5e0769c54d2c81a5dcdabe22a86c790e46e0b3ca281c19ce0

  • memory/1644-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4012-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB