Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 05:20

General

  • Target

    d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb.exe

  • Size

    502KB

  • MD5

    d09dbfcaacc4e72dc2ff2d9119b7b9f1

  • SHA1

    8691ac9bbabbe829446b56c73888d8a0adf0b92b

  • SHA256

    d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb

  • SHA512

    b263e88a053292dd0f12dffc01be23e90198fb05591bacab6471afdc9a49254c65ab560301edada29e4051f698ad8bb1de1e6563338e7ea51ca3032670f0c75f

  • SSDEEP

    12288:B7MyjkhHoKi/5FeA7Bp8YNs8z0UTcmQo8CJsGmZ:B7M86ghxTRdJshZ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb.exe
    "C:\Users\Admin\AppData\Local\Temp\d0625305c7cada6abafc98eca583c35ac2e25028cb63f43fee168b9bb6c5f8fb.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 532
      2⤵
      • Program crash
      PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\skovmandshilsnerne.lnk

    Filesize

    858B

    MD5

    6d7d8a088f2cecfe667f431be625e1d8

    SHA1

    48caabd0ef6fa9c26fa4c1528f12cc52ff426b14

    SHA256

    d7868c70ae61300a6f2147d18640206264ee172705d5a0f47cd708a32128359b

    SHA512

    d8e3c02066d68ec84d1808b06d84659a0966188552587fdbffc23f4e0577bfaf77879f6e12a4228842aea350d7f61e3c00b81fcba9ce004a5e6eb5a2aaadaaec

  • \Users\Admin\AppData\Local\Temp\nsjC3FD.tmp\System.dll

    Filesize

    12KB

    MD5

    0d7ad4f45dc6f5aa87f606d0331c6901

    SHA1

    48df0911f0484cbe2a8cdd5362140b63c41ee457

    SHA256

    3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    SHA512

    c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9