Analysis

  • max time kernel
    93s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 11:41

General

  • Target

    18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452.exe

  • Size

    32KB

  • MD5

    eb81d2410f00ad7da0caa781f12d3247

  • SHA1

    9d646775da962e688fed2faae1b3a7558d33faf0

  • SHA256

    18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452

  • SHA512

    60365206e85cf0feff2424d658431108b218e4b24acbe50b521edfcbc9092592415ece4983a0cffb0b2a3b5da928741b3a66a465748fc9a2fe88686e699ada60

  • SSDEEP

    192:p/H3z1rWSUcVKbCBpLg1GqPQUS2b3z3ZuizSmiZBL/YfwDLXkUKfoa2hTbP4oynK:x7UcIbHDZxzSRLbHXvKfoa2d43KZZIls

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452.exe
    "C:\Users\Admin\AppData\Local\Temp\18bb2d2546894997e53a361aae9f7534d934d0d549a210b2e350be842e913452.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ydlem.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ydlem.bat

    Filesize

    512B

    MD5

    b795e6d622a298d9090ec866d8d72320

    SHA1

    d77527ce6e6a3886018b8d39b7abaa37393fcb2e

    SHA256

    cf93808c5bae06a02b14acbce8286d7e3aa085f8505a088b6a50072ccb2a0328

    SHA512

    6fabfe49758f6e59ba709ca0c104acacce95fe545df6e14fd221a10fa7e5df17cca0cf04386259376476ae316a6ede6d4a797e0c96dd7743581b00183db41280

  • C:\Users\Admin\AppData\Local\Temp\ydlem.tmp

    Filesize

    32KB

    MD5

    ab45f2cac2a4dd6b193ad3c3c948b356

    SHA1

    2873fba3597a02d496baf676d2cbf939610f328e

    SHA256

    6124b9df402fce76a049949178d33844b0ba7c4809121daf5dd268975c8ed1dd

    SHA512

    f5d395d75908364d0a5b909500ed8a6f483f79d20adac0c3f1ec35d7acbec2db85cc8e1d64b30f40f28afbacbd46aef6abab51521fd1e2f43123d7b767ac43f2