Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-12-2024 16:11

General

  • Target

    DJI+Assistant+2+For+Mavic+2.0.14.exe

  • Size

    220.9MB

  • MD5

    5ed21360de855550b5d76fd3b58a0d9c

  • SHA1

    8ec79d60dc65fa62d28fc34a0d729cfc5b58968b

  • SHA256

    d5df2d8ea45e881670a9b723a495363fb198700a60b47cba5507bf1164e14698

  • SHA512

    659b3d430259e13ae26422b3c79ba5cc1a41e319f690a9947b310e073260f21204432a5ad752e615146a338ef9d6f26eac78fa9418e73451cbb7fbbffdbfd6d7

  • SSDEEP

    6291456:9Zd82MdKKBxeHHR6z9PXGGYt4+mfRci0DkkCc78LE:9VMdvBxeHoJXGftPj8g

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DJI+Assistant+2+For+Mavic+2.0.14.exe
    "C:\Users\Admin\AppData\Local\Temp\DJI+Assistant+2+For+Mavic+2.0.14.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\Temp\is-STNUM.tmp\DJI+Assistant+2+For+Mavic+2.0.14.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-STNUM.tmp\DJI+Assistant+2+For+Mavic+2.0.14.tmp" /SL5="$60108,231323589,174080,C:\Users\Admin\AppData\Local\Temp\DJI+Assistant+2+For+Mavic+2.0.14.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-STNUM.tmp\DJI+Assistant+2+For+Mavic+2.0.14.tmp

    Filesize

    810KB

    MD5

    d7201445863ea1a413ac8308f5d676bc

    SHA1

    016e8f0a4bf81a13b98f771344bc1f08fae3e065

    SHA256

    9a73becd878bf1da2825c6513b8dd672ddd18cd1cbb6a1de6069673ff3d115d8

    SHA512

    4ba891c4af69b6337a96929d2da636114c6f155dd83bcfd76938f8d90fa34c370df085e71f578b8e0994b034b0d0355fb316cfffa913bb05173165ba98ed22a2

  • memory/3380-23-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-6-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-19-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-21-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-9-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-11-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-13-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-15-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-35-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-17-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-33-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-31-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-25-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-27-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3380-29-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3392-2-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/3392-8-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/3392-1-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB