Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:13

General

  • Target

    lazarus-3.6-fpc-3.2.2-win64.exe

  • Size

    204.2MB

  • MD5

    f8bfe70d72149e676a5caac273591b09

  • SHA1

    bb0856e90773e239757b4df1acd229f8f3eb906f

  • SHA256

    568ec39f976d789ad4cfee75c999f1fe4fe0cbf54089a2b26d3b098b9190cc75

  • SHA512

    abaa9a44107ff439f5f79efc9be26ffe47509efdcf9cbd6b0a481dddfc02ba06c06e401e459646cd4edf37962e23cd564c550d9da9782195ad200ba56a55da6f

  • SSDEEP

    6291456:6vd3wEvYa1wzLabvl/C1+Kj45Qlk5aBUuqGcLYVD3k3n50:s/Aa1mKNC1Fj4mlk5QhUYhk3n6

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lazarus-3.6-fpc-3.2.2-win64.exe
    "C:\Users\Admin\AppData\Local\Temp\lazarus-3.6-fpc-3.2.2-win64.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\is-CA0B7.tmp\lazarus-3.6-fpc-3.2.2-win64.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CA0B7.tmp\lazarus-3.6-fpc-3.2.2-win64.tmp" /SL5="$E004E,212389209,121344,C:\Users\Admin\AppData\Local\Temp\lazarus-3.6-fpc-3.2.2-win64.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-CA0B7.tmp\lazarus-3.6-fpc-3.2.2-win64.tmp

    Filesize

    1.1MB

    MD5

    34acc2bdb45a9c436181426828c4cb49

    SHA1

    5adaa1ac822e6128b8d4b59a54d19901880452ae

    SHA256

    9c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07

    SHA512

    134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb

  • memory/2100-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2100-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2100-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2932-15-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-21-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-11-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-13-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-6-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-17-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-19-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-9-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-23-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-25-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-27-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-29-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-31-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-33-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-35-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB