Analysis

  • max time kernel
    7s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    487afaa2421384f1449a96637df558b4.exe

  • Size

    15KB

  • MD5

    487afaa2421384f1449a96637df558b4

  • SHA1

    87f9edc71b13f5bb1b87e0369e531ee6d17aff4d

  • SHA256

    b6fd976bea3755f5b73802548928b389789584076b9d5a3e5d42642792707cdd

  • SHA512

    905765c455b15e2221e92cb42abb075aac1bb8add344f4e8a4d9334361239d741077918f9d04f21effbb3c72f19124521bc097170099d6a31b802c523b2b6985

  • SSDEEP

    384:o7y8xJoeC71aRZtKBl9vOVUkgha4H94jWjel0:oek65URZWnvOVJ4H9XA0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe
    "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sjaltgcu\sjaltgcu.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E89.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE984302173024C209B8B9CE1F1B4EA8.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5852
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe" & move "갬갮갍갂간갎객.exe" "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4836
      • C:\Windows\SysWOW64\PING.EXE
        ping 1.1.1.1 -n 1 -w 1000
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES6E89.tmp

    Filesize

    1KB

    MD5

    44e074db4a497dbaf82526827ba3641d

    SHA1

    37f0e3ff89ba0a7d15337160b03dcfb9a36f948d

    SHA256

    9f0375c9f17cc7303dcb483781674cefb88c9294510bbfc9181f43202d243539

    SHA512

    8affec500f508f953ad55423c255fbfe49dabdf6e4579c1e8c5e7bb332ab9dfd4bc3283cb1782ba5c9c12a2b5df6194eaa1c5b411626066d8a63ed2ba7f23473

  • C:\Users\Admin\AppData\Local\Temp\갬갮갍갂간갎객.exe

    Filesize

    15KB

    MD5

    5dbfcc2fe28b7649822f7e2c43f5e96d

    SHA1

    a092c4fdcf6e748f27086d7def0d16a1328983bf

    SHA256

    77b13e49d3b6b964138d9f05d5da661ccb6000936fbe99748f9f8cc4a75c8d6b

    SHA512

    1b035c3470f184175b7904b928ffa6c053ba3b774c1b7835fab32c0571c8594841ed89b56b3c97b17b36a775ac9bd9ee7ad41acd39eb189cea152388aa38e6ea

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCE984302173024C209B8B9CE1F1B4EA8.TMP

    Filesize

    1KB

    MD5

    ceb7ed0637e15ca42f5d964490237625

    SHA1

    260998dc264231c1703f91b0523ed159965764fc

    SHA256

    2dfe9abfec134621c4624ff3d48630fd6c02a282cb17abf3ac289e788e9561dc

    SHA512

    cfe43ed26c8574034abdf2c1a454ef5ce0039e5dd0a13f4dc68bfbc3c444af9106561b161974b66b40905aa4e42bdd7983a37b0f0adcd828d45aae82329e3946

  • \??\c:\Users\Admin\AppData\Local\Temp\sjaltgcu\sjaltgcu.0.cs

    Filesize

    26KB

    MD5

    a6b5033144744d90b586eb2c9375286c

    SHA1

    42a9299889a29b5c0271bf49c06e16429b9053a1

    SHA256

    14d4d2548dc473c03a0df3b8a0905bd3cf1f22438049089203a6484fca16d626

    SHA512

    6e7cf58286be7d7623feb12b7ac9b59f0536f355d228530f07b7ffdc99599406add8b1c5e8b58a5d003178e60efca88b1267ab7027f1869883c835e344e0aa49

  • \??\c:\Users\Admin\AppData\Local\Temp\sjaltgcu\sjaltgcu.cmdline

    Filesize

    281B

    MD5

    81261d00f241578aa41c42cf0979578f

    SHA1

    2f794704f0d5593af7b457a191d2261b295999c9

    SHA256

    4606ff7c5917a5002e15e1d259588d104ca219cb2c5bdd8ab11f674886cb02f4

    SHA512

    0a83972ff82d77dc7d97e8910951786f3d26ed8e1b91372781c7a02b815b973be26a47ee66ef5b5b8d105d88f0747de67d828eb80cf662aad8e0e4fa5546b36a

  • memory/5684-4-0x00000000055B0000-0x0000000005642000-memory.dmp

    Filesize

    584KB

  • memory/5684-3-0x0000000005500000-0x0000000005508000-memory.dmp

    Filesize

    32KB

  • memory/5684-5-0x0000000074E40000-0x00000000755F0000-memory.dmp

    Filesize

    7.7MB

  • memory/5684-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

    Filesize

    4KB

  • memory/5684-18-0x0000000005680000-0x000000000568A000-memory.dmp

    Filesize

    40KB

  • memory/5684-2-0x0000000005A60000-0x0000000006004000-memory.dmp

    Filesize

    5.6MB

  • memory/5684-23-0x0000000074E40000-0x00000000755F0000-memory.dmp

    Filesize

    7.7MB

  • memory/5684-1-0x0000000000BC0000-0x0000000000BCA000-memory.dmp

    Filesize

    40KB