Analysis

  • max time kernel
    126s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 12:25

General

  • Target

    f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe

  • Size

    16KB

  • MD5

    877b0e59711c9db27810f9973e7e5a5e

  • SHA1

    de068d936c493b86214b5f2762ac77a05c3482d4

  • SHA256

    f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b

  • SHA512

    23be0a43d326a461ecb5c1c7f11222214815720b60e5b6954ae3cbae5859a46da2b9386d9993aa969a77ad754edc13d5bb1038541414b33cdca42fe9111c71c8

  • SSDEEP

    384:ulis+wQ7rmUMGid0Z3Nbe1xFCiCGZ74+I:f9hM2dB4XAGZkt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe
    "C:\Users\Admin\AppData\Local\Temp\f492c1aba351e6ee67fdd6558b970d16880d823d291e787ccbea1385f85efe7b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\trueupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\trueupdater.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\trueupdater.exe

    Filesize

    16KB

    MD5

    062a9dc2bba25b6805389ba7235c22d4

    SHA1

    d4caca383951ab41d4fbd57c06e934fa1f8eec5b

    SHA256

    63f093f18be26c7fb08588db9a6897414041bc9f2cc6f88dce2aab3a878b62a1

    SHA512

    f199a7343b004d9db14a2ea486d0e52b065373d9c3e49b4f7aa9c811474320ffb37c67f34bd00087eebf008baca26589f9c3656400649ea2156db3f3d30591f1

  • memory/1380-0-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2448-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB