Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 00:27

General

  • Target

    475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe

  • Size

    9.9MB

  • MD5

    22749324823165ef5a28206c80c91730

  • SHA1

    2ad83418b07b047cbe85555fdeb6524288bcbe06

  • SHA256

    475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9

  • SHA512

    ef31c8f0b9831bc9ab7c14f5a1ff195e61d05ac18ab082e1a6c00b07c7c605d805383bb6426724e7cb2075438eac2092ae6c0caf60e66a2bb61f751111577a00

  • SSDEEP

    196608:P9q4cOCyBi0gOUgjIPlh5VLax9UEoSYg/0hW9c/1sylJghH:PcUc0hHj2ldax9Ui0hwcNsO2hH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe
    "C:\Users\Admin\AppData\Local\Temp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\is-2ETU2.tmp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2ETU2.tmp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.tmp" /SL5="$400F4,9508229,906240,C:\Users\Admin\AppData\Local\Temp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-2ETU2.tmp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.tmp

    Filesize

    2.6MB

    MD5

    cf5ea6d23d433c71522847863bfbe923

    SHA1

    b224af2195a1ef26e84baf9f0f069de3eee4bfb6

    SHA256

    221b0d06b4cbebd645e3ffe04092f18688587cdbe095f66a2b5739f5996e1eae

    SHA512

    9913d139b1885abfe2f8715fbf4734a595fdf3f6f6feb110ecbf36177e926352262bfaf9a120a4d258a2b2cb89a2973d51bf0c43ecc580ecd8ea7e4389dd0ea3

  • memory/2864-17-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-23-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-8-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-11-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-31-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-13-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-29-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-19-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-15-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-21-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-27-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2864-25-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/2968-0-0x0000000000400000-0x00000000004EB000-memory.dmp

    Filesize

    940KB

  • memory/2968-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2968-10-0x0000000000400000-0x00000000004EB000-memory.dmp

    Filesize

    940KB