Analysis

  • max time kernel
    117s
  • max time network
    267s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 12:26

General

  • Target

    Hemingway Editor 3.0.6/App/Hemingway Editor/Hemingway Editor.exe

  • Size

    22.5MB

  • MD5

    6d035bd7f0d89f55f088d2c151c5456c

  • SHA1

    df8505f051de544bba0709af49d2e94074764aa7

  • SHA256

    6e82ea42ed3db57335e4cc6a98a3b0de324d6ef040e38c9fc309fc8e864a233e

  • SHA512

    a67b5e893b5ad496ac3c478f8b5b3f2767c36b4fed5c13cd8a0dd91bd95935bca535ab23d86859b0d300e4b24e30c523f6509017dd38d28cb31aaa93d8d209a4

  • SSDEEP

    393216:4Yl3Jps1k8U7C24rh7dYoq2ssWXmlnxWPdlzU9BE5XUV5Cxt7RV:4YlwUuFBlqllXm5ElVXUV5CxB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\Hemingway Editor.exe
    "C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\Hemingway Editor.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\Hemingway Editor.exe
      "C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\Hemingway Editor.exe" --type=renderer --no-sandbox --primordial-pipe-token=E5D361C79DCF495C1E18561BA07054CB --lang=en-US --node-integration=true --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=9E39F560DC678A50E78F716D6B036600 --mojo-application-channel-token=E5D361C79DCF495C1E18561BA07054CB --channel="2676.0.153318607\850174734" --mojo-platform-channel-handle=1480 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\Hemingway Editor.exe
      "C:\Users\Admin\AppData\Local\Temp\Hemingway Editor 3.0.6\App\Hemingway Editor\Hemingway Editor.exe" --type=renderer --no-sandbox --primordial-pipe-token=A7FFCD5021D1E0270CDE17AF747D1C2C --lang=en-US --node-integration=true --hidden-page --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=0CD3EE212BC49F31CFCAFFEFCADCF80A --mojo-application-channel-token=A7FFCD5021D1E0270CDE17AF747D1C2C --channel="2676.1.713043813\858005303" --mojo-platform-channel-handle=1496 /prefetch:1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62f95403a4107b83438a58f38577c1ff

    SHA1

    160fd6ffff40cb6265b44bf431380dc5556028aa

    SHA256

    8a8c1968fda3cac2fa62ae91760ec223e9705f37256bf9da4d69383ff0aa6c31

    SHA512

    b2aa0cfb7a300685e6061a4c5fc73c39806b4b71eb762a01a26bdcb82f21e146baa6ea4104f1ff31ed19bff1ef8e73e32e0e0b25c30da0758a1dc48e78cf643c

  • C:\Users\Admin\AppData\Local\Temp\Cab2F4C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2F5F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2624-97-0x0000000023E00000-0x0000000023E01000-memory.dmp

    Filesize

    4KB

  • memory/2624-76-0x0000000000CF0000-0x0000000006059000-memory.dmp

    Filesize

    83.4MB

  • memory/2676-0-0x0000000000CF0000-0x0000000006059000-memory.dmp

    Filesize

    83.4MB

  • memory/2676-3-0x000000003C600000-0x000000003C601000-memory.dmp

    Filesize

    4KB