Analysis

  • max time kernel
    111s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 11:40

General

  • Target

    58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe

  • Size

    20KB

  • MD5

    fd01b96befef060da133465b23dab5ee

  • SHA1

    247f17ab86ec296e0d0b7a1d17060960fe82e8d4

  • SHA256

    58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85

  • SHA512

    5f6ff87ac7d0b8acd5e131cac5f65268cbff0eb4ec9ad4bce59d0379ea942474eb2d7a6ac6c67f36f79eebf7a71684a3041000aa3063d29d681239729440d818

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+L4113:hDXWipuE+K3/SSHgxmHZ19

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe
    "C:\Users\Admin\AppData\Local\Temp\58fdf276667f55425c147f77ce7d357f844128072d88f1fe0f5705fe2ad79d85.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\AppData\Local\Temp\DEM712A.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM712A.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Users\Admin\AppData\Local\Temp\DEMC83F.exe
        "C:\Users\Admin\AppData\Local\Temp\DEMC83F.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\AppData\Local\Temp\DEM1EE6.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM1EE6.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1500
          • C:\Users\Admin\AppData\Local\Temp\DEM756E.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM756E.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2996
            • C:\Users\Admin\AppData\Local\Temp\DEMCC54.exe
              "C:\Users\Admin\AppData\Local\Temp\DEMCC54.exe"
              6⤵
              • Executes dropped EXE
              PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEMC83F.exe

    Filesize

    20KB

    MD5

    80baf2316f95bba4096cc0df37030d04

    SHA1

    eacd9e09f0382a3a2cbed32db1f35ccfd573013a

    SHA256

    75c8fce3201b982e11c74f3040330fa8fc234f97c92eb234fed56935eb44d61e

    SHA512

    b80701963928cfb4a977c2b79e50ccdf436388e855697e892854c70ca89f4428eb67f8da2202aeaa4c3ab122731034f445341019480555dacccab59ecfc39dd7

  • \Users\Admin\AppData\Local\Temp\DEM1EE6.exe

    Filesize

    20KB

    MD5

    d704eef49fddac0969a61ce4a2756e92

    SHA1

    9b83f388b7b7470fa74db551e6d98b465a6cdf6f

    SHA256

    d06a9d8504b85ae68acc41a999b37da2257c14a4878978ed20fb615dd4eb57d6

    SHA512

    632ada073a0edcf613e5d6ec9f12b6a935f7bc2dbb0bf70cce1431ecdad848273c13bf0568359b9b46ed6501fffbc252eef105b2b6641168cf502e54f7b01dbc

  • \Users\Admin\AppData\Local\Temp\DEM712A.exe

    Filesize

    20KB

    MD5

    a372b199f222137c815f05096f9d7816

    SHA1

    6c7e53533c79dba881985d4d1cd7936c29c35072

    SHA256

    2df8e30585fd4c24c2919438a892367fd986905d1ed14b5fb0ee6d6c876e1c5e

    SHA512

    2e21970393eac3369047edcb27b24aa824f9445dd456e4c38e47c6341bd6b1e026641559e5ab6d4b1a9aba42ec1c5bf1b2c8fe2c6425e0588a79701c78f05052

  • \Users\Admin\AppData\Local\Temp\DEM756E.exe

    Filesize

    20KB

    MD5

    57f751c84c9f5727a864eb24419d3208

    SHA1

    f90e405460cf2c57bc10c89ff588e8836973f356

    SHA256

    be1a5de70245f3dd2b8836ec28447fc90f08d9a658a5d90488e04d2b76ee2c2c

    SHA512

    3f49b4c1a3a5db7f85789cc62a45978a921f3161c59d0f3c887e3805f0ec17f37482dfb7a1da8ed56a80a6aa361ea6f23e0f56ff8cfb0106149310a8c9b2c79f

  • \Users\Admin\AppData\Local\Temp\DEMCC54.exe

    Filesize

    20KB

    MD5

    89c7c8a86064b6a7591b85f5ca652341

    SHA1

    a6620936d5d78c081040b39b12f8399dd6dd3667

    SHA256

    068b222e8f8d054680105fb096422e7c32893e0c87262fae761c8d800ae78ad1

    SHA512

    876120ea6d0c162fef0e5fdcbbac68560bf1f974b88f4c88c57e5d4dca89de7a2212b49742a4a2ce21741b654e6bc44d744b8180d19d599eaed7c183d83567be