Analysis

  • max time kernel
    84s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 11:41

General

  • Target

    18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452.exe

  • Size

    32KB

  • MD5

    eb81d2410f00ad7da0caa781f12d3247

  • SHA1

    9d646775da962e688fed2faae1b3a7558d33faf0

  • SHA256

    18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452

  • SHA512

    60365206e85cf0feff2424d658431108b218e4b24acbe50b521edfcbc9092592415ece4983a0cffb0b2a3b5da928741b3a66a465748fc9a2fe88686e699ada60

  • SSDEEP

    192:p/H3z1rWSUcVKbCBpLg1GqPQUS2b3z3ZuizSmiZBL/YfwDLXkUKfoa2hTbP4oynK:x7UcIbHDZxzSRLbHXvKfoa2d43KZZIls

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452.exe
    "C:\Users\Admin\AppData\Local\Temp\18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\ydlem.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ydlem.bat

    Filesize

    516B

    MD5

    5181ee39d2384468afe4ddd5d2a98a1f

    SHA1

    7cbdd17f95a631825b5310c5a263b5804f82537c

    SHA256

    6c2830413217d379de7da190b8713214cd1577aa811df64ae7942e67321f2c14

    SHA512

    d938af5d671e425ca8cd29d1da7dba806feb4721ae5ec1932c91cbb2e0f7e5f2db388587ad81a7cfb8e963a70523355ce92f1afd6753475974862199013e2ed5

  • C:\Users\Admin\AppData\Local\Temp\ydlem.tmp

    Filesize

    32KB

    MD5

    2d367c1248d653640dfc32c1c18a661c

    SHA1

    5b821d41b81a113941c1d987e76699233c77162d

    SHA256

    9dd19c9846e1ca132cbcd830c25adf1aa65856949f47f69740d5846b6bc0aae9

    SHA512

    80189d482f484a8c8b1466735788d2d60411e5a2727b89a5b6e6e20d5966b92d3133f71640a7b2e53216b44a53cc8cccdc6fcb22b6e520e2dca0a05026d10a8f