Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 10:46

General

  • Target

    e87738f9a7d9d4e7307a721df07da9ac53d927dc6921d585d6b46cca130ddd83.exe

  • Size

    89KB

  • MD5

    8e1bb08da1f9c8ad8cabf3b9380d8f3a

  • SHA1

    5bc3f92b76c9745308232c2fea22de826a087c8f

  • SHA256

    e87738f9a7d9d4e7307a721df07da9ac53d927dc6921d585d6b46cca130ddd83

  • SHA512

    ec212c24bf5a3a852ee31f2b6a014835133b465641519ca7d45bd24799516faa844274f3a06911a642c2da5f3219eb3d2f3633c26ade6d47adb80ec66049d846

  • SSDEEP

    1536:GdWvtNFN+F+EchVsM/Vycyq1h6MtVYTjipvF2wI/KR11JdNqNY4X9/a:IW1NWcyq1hnbYvQd26xU/i

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e87738f9a7d9d4e7307a721df07da9ac53d927dc6921d585d6b46cca130ddd83.exe
    "C:\Users\Admin\AppData\Local\Temp\e87738f9a7d9d4e7307a721df07da9ac53d927dc6921d585d6b46cca130ddd83.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Users\Admin\AppData\Local\Temp\rianesad.exe
      C:\Users\Admin\AppData\Local\Temp\rianesad.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rianesad.exe

    Filesize

    89KB

    MD5

    bff3ecca3b54b96a89d34e8f90a356f7

    SHA1

    b2e1c8e43e5284e5ecb1569c9c1e7e8a0114105a

    SHA256

    d6e6c23c8f732800fc89f2917f0111b013fc9770d7251eb652a4a0e1b0788845

    SHA512

    3bfbd7fac74118fbdcb6d04f64433ec6d4955fcf1c3d7dfcbaa26f0e5bac1a6879f153828c7393665a03fd09b630763e874ca9a8d041b40d1e34f4ed92aa60af

  • memory/3816-0-0x0000000000403000-0x0000000000405000-memory.dmp

    Filesize

    8KB

  • memory/3968-5-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB