Resubmissions

10-01-2025 02:36

250110-c3z3hsyqcv 10

10-01-2025 02:22

250110-ctwzhaymhs 10

Analysis

  • max time kernel
    91s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-01-2025 02:36

General

  • Target

    0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe

  • Size

    1.3MB

  • MD5

    a0f063b82ce5a44aba075f17b9284bab

  • SHA1

    e1c46fb92ff3827347c47362511ccb0b1b09f123

  • SHA256

    0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118

  • SHA512

    53c13f552eba709d7a558b34c2c1ecfd35b42391b33fb882a4cb3fb3c667e4d1c4e269e7d8b3d0688bd750912307cec1612bde9c0c967615ac34f4d015ce5d29

  • SSDEEP

    24576:QxrfEXAiIKn+pSBDXQtHjoD4eS8QfuBeeTAi/ZIwoMmoz8qj7UnaBK9PIU/gsjTO:a8QGBeqvBbLQqqIiVTvsBV

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3344
      • C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe
        "C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:416
      • C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe
        "C:\Users\Admin\AppData\Local\Temp\0567b98365f8f5e5a3adf508dc7234ea7b50270a8106c3a66a0da96f38058118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/416-0-0x000000007492E000-0x000000007492F000-memory.dmp

      Filesize

      4KB

    • memory/416-1-0x0000000000C90000-0x0000000000DEC000-memory.dmp

      Filesize

      1.4MB

    • memory/416-2-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB

    • memory/416-3-0x0000000005960000-0x0000000005A92000-memory.dmp

      Filesize

      1.2MB

    • memory/416-4-0x0000000005A90000-0x0000000005BB8000-memory.dmp

      Filesize

      1.2MB

    • memory/416-5-0x0000000005C30000-0x0000000005D5A000-memory.dmp

      Filesize

      1.2MB

    • memory/416-7-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-6-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-19-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-69-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-63-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-61-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-57-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-55-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-53-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-51-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-49-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-47-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-43-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-41-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-39-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-37-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-35-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-33-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-31-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-29-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-25-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-23-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-21-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-17-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-15-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-13-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-12-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-9-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-66-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-67-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-59-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-45-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-27-0x0000000005C30000-0x0000000005D53000-memory.dmp

      Filesize

      1.1MB

    • memory/416-1328-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB

    • memory/416-1329-0x0000000005DC0000-0x0000000005E44000-memory.dmp

      Filesize

      528KB

    • memory/416-1330-0x0000000005EA0000-0x0000000005F20000-memory.dmp

      Filesize

      512KB

    • memory/416-1331-0x0000000005F20000-0x0000000005F6C000-memory.dmp

      Filesize

      304KB

    • memory/416-1332-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB

    • memory/416-1333-0x0000000006840000-0x0000000006DE6000-memory.dmp

      Filesize

      5.6MB

    • memory/416-1334-0x0000000006200000-0x0000000006254000-memory.dmp

      Filesize

      336KB

    • memory/416-1338-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB

    • memory/416-1340-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB

    • memory/416-1350-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB

    • memory/416-1349-0x0000000074920000-0x00000000750D1000-memory.dmp

      Filesize

      7.7MB