Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 00:27

General

  • Target

    475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe

  • Size

    9.9MB

  • MD5

    22749324823165ef5a28206c80c91730

  • SHA1

    2ad83418b07b047cbe85555fdeb6524288bcbe06

  • SHA256

    475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9

  • SHA512

    ef31c8f0b9831bc9ab7c14f5a1ff195e61d05ac18ab082e1a6c00b07c7c605d805383bb6426724e7cb2075438eac2092ae6c0caf60e66a2bb61f751111577a00

  • SSDEEP

    196608:P9q4cOCyBi0gOUgjIPlh5VLax9UEoSYg/0hW9c/1sylJghH:PcUc0hHj2ldax9Ui0hwcNsO2hH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe
    "C:\Users\Admin\AppData\Local\Temp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\is-9R6ST.tmp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9R6ST.tmp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.tmp" /SL5="$90060,9508229,906240,C:\Users\Admin\AppData\Local\Temp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-9R6ST.tmp\475a45445f2673b60764265465a0f05976fc0dc884d343c1b0fca919cfc47fa9N.tmp

    Filesize

    2.6MB

    MD5

    cf5ea6d23d433c71522847863bfbe923

    SHA1

    b224af2195a1ef26e84baf9f0f069de3eee4bfb6

    SHA256

    221b0d06b4cbebd645e3ffe04092f18688587cdbe095f66a2b5739f5996e1eae

    SHA512

    9913d139b1885abfe2f8715fbf4734a595fdf3f6f6feb110ecbf36177e926352262bfaf9a120a4d258a2b2cb89a2973d51bf0c43ecc580ecd8ea7e4389dd0ea3

  • memory/1096-24-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-18-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-6-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-30-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-10-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-12-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-28-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-16-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-14-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-20-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-22-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1096-26-0x0000000000400000-0x00000000006A1000-memory.dmp

    Filesize

    2.6MB

  • memory/1548-0-0x0000000000400000-0x00000000004EB000-memory.dmp

    Filesize

    940KB

  • memory/1548-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/1548-8-0x0000000000400000-0x00000000004EB000-memory.dmp

    Filesize

    940KB