Analysis

  • max time kernel
    111s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:06

General

  • Target

    93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.exe

  • Size

    1.8MB

  • MD5

    8d6963f97d8dcb8db331f6f977aa5aab

  • SHA1

    86be0ba076ff151ee56d2e914ef3961f3389ddd4

  • SHA256

    93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07

  • SHA512

    0b8c17be6315987e9f38ae28da8c960782733374dfbf7e06773e2c71c17276f93187f0084389624e0454e97593aa6b352563e17f3fdcbc8d656073f31d7dbfd6

  • SSDEEP

    24576:HawwKusHwEwSDMn6pGqKjWidUSeMITCqgcfyr4Py6K22i+i8rtVs1ZY7jQY71Y:XwREDDMZjdHeMxWrP+beY7UY71Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.exe
    "C:\Users\Admin\AppData\Local\Temp\93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\is-K0THG.tmp\93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-K0THG.tmp\93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.tmp" /SL5="$701DC,935482,845824,C:\Users\Admin\AppData\Local\Temp\93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-153J9.tmp\idp.dll

    Filesize

    232KB

    MD5

    55c310c0319260d798757557ab3bf636

    SHA1

    0892eb7ed31d8bb20a56c6835990749011a2d8de

    SHA256

    54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

    SHA512

    e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

  • C:\Users\Admin\AppData\Local\Temp\is-K0THG.tmp\93ad4a14b2aab3499c81ea79ab7ad840ba59fe7746e0484b6ae01367e9ecda07.tmp

    Filesize

    3.2MB

    MD5

    5dae2656392207a3c3c64d7e426b94bf

    SHA1

    2241348b1cefd787c6dc408aa8ccacc31f24e2b4

    SHA256

    c6831b423ff035f87c92b6f8a013836153a7f1c789cd65ff59235d6981e0ff8d

    SHA512

    48f6f0d80270f2d8661e5da5fd7e5dae99b053d9681342a97e726c9aade906b53a7ad463fe9431c9a212e4bd451b9e65bf6160bc9a5204fc89bdd62debb90a6d

  • memory/1384-16-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-18-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-34-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-32-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-14-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/1384-13-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-30-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-6-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/1384-20-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-22-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-24-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-26-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/1384-28-0x00000000008A0000-0x0000000000BE3000-memory.dmp

    Filesize

    3.3MB

  • memory/4712-0-0x0000000000560000-0x000000000063C000-memory.dmp

    Filesize

    880KB

  • memory/4712-12-0x0000000000560000-0x000000000063C000-memory.dmp

    Filesize

    880KB

  • memory/4712-2-0x0000000000561000-0x0000000000609000-memory.dmp

    Filesize

    672KB