Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:05

General

  • Target

    7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395.exe

  • Size

    192KB

  • MD5

    0ac5bbf01945e7e4dd558f7061c6275b

  • SHA1

    c3060f34a5d6a0dcf3bf6ea601fb902f8514c406

  • SHA256

    7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395

  • SHA512

    179ae4ecd59c7ace6497965960f11f70c330a301f3a0b497732ade58b79677aada5a420590e3879872889ed3b55392c70a0daed46c8edfa4c58ac95a334393f0

  • SSDEEP

    3072:MVn+gx5qMtlynr2tfXvE2jodGIA7PopDCjoemitVEU78OokaWBT:MVn04lyr2tf82joshuDCUbiHV73aq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395.exe
    "C:\Users\Admin\AppData\Local\Temp\7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Local\Temp\7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395.exe
      C:\Users\Admin\AppData\Local\Temp\7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7e18ee24ef52e8ce67845539bf3a9a46ad30da7d4ccae8144eb8a9c7fdba9395.exe

    Filesize

    192KB

    MD5

    0dca553e649e79767ace361b561c6add

    SHA1

    19e1494c0d75f7d91f5aba0b1d4b10469536ceb7

    SHA256

    308955b4486eaaba339aaa04717990802f62f4dbe39df9e67426fd9efcb7b69c

    SHA512

    90589ffe7f46b7c183dcd444011de033ac58cce46aaa8b45fe4c3270f9c812c981017c5424ea08d45696524745a92db99e7c415ee21aef8f73daa713032284cc

  • memory/2764-11-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2764-17-0x0000000000130000-0x0000000000167000-memory.dmp

    Filesize

    220KB

  • memory/2764-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2764-18-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2776-0-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2776-9-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB