Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:17

General

  • Target

    ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366.exe

  • Size

    32KB

  • MD5

    bead953595a4a3c373144063dfa8f885

  • SHA1

    d1caecaacfc8b0cbf65fb50155c32fa2d141eee7

  • SHA256

    ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366

  • SHA512

    a1b40ac1872ca15b0001cc9e2f35e2d16728e617719fd90ab08648b8a30acd35cb045d5c16fd3bb8b7d720695ae5189c5a20f952891c73e16888b5e9f35797af

  • SSDEEP

    192:p/Qn5smrSUcVRwLgyAOSfUML5dyfeqR6J+idTcXNwfKYfwDLXkk65oa2hTbP4oyP:ynaUczqSMxRhIT7EHXfSoa2d43eZZIl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 47 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366.exe
    "C:\Users\Admin\AppData\Local\Temp\ecae75b32ba6635db07f3135c3ccb67fc7b7183db617aae884492ff10730a366.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ydlem.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ydlem.bat

    Filesize

    512B

    MD5

    6fafe6682b15694c2a8532d2b7e99e79

    SHA1

    4e504cc61370798df025616116354da9d80a9a7c

    SHA256

    e6674cd1d2220366f43f6b164e662cf9762bc25a4fdb722ef2ba62d54b6bc63c

    SHA512

    71b971940dafcf37601013d35be745099a79ae887db14980ca8ba3b905c8b6473fbe33cb5e9ee49e5b0530babccc3961ed84518632cbc12a3f089ec8eda37314

  • C:\Users\Admin\AppData\Local\Temp\ydlem.tmp

    Filesize

    32KB

    MD5

    2cfc98934592134ecf0bdb05be569cc5

    SHA1

    a6280e3f1eeaac6eb421f0a79c1df7f62274735a

    SHA256

    00ac37d63a51297599d8b6ea479022d67b2f3d133c2799cf4e552774512e52d0

    SHA512

    284be35634cdff4ff0cce06388f9089057d66647901cd4a9d6aaf63def8cf521e4a088fec848a9880bf4c58c623fd8d2e1326b3a6f90db6433c696aad255185a