Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2025, 14:08

General

  • Target

    b5048d690d3f4da32eb120c8c290f637fe46fd01c17434ff66b011a79ed99780.exe

  • Size

    254KB

  • MD5

    10f73f10bdd83a02a89e2dea57bcdb7c

  • SHA1

    8e0fb3c8d3f341fd7ed7a3f94209418202a5467a

  • SHA256

    b5048d690d3f4da32eb120c8c290f637fe46fd01c17434ff66b011a79ed99780

  • SHA512

    c1eab746d2c529ba3006498982cc647e63260f02aa56ceedc313a776147a49ebfa23e97122a779db345c92223733f5b7321685a1fea468e5da4efc0f503a73d1

  • SSDEEP

    3072:bGsbKonnfnoSGQWAFFWctEy21h4PQCDWimf4tI+45YCqYcQUhUAEABL5Ob/6XpmY:bGUnfoShWPh6JtI+6PcphkUSyXpmppf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5048d690d3f4da32eb120c8c290f637fe46fd01c17434ff66b011a79ed99780.exe
    "C:\Users\Admin\AppData\Local\Temp\b5048d690d3f4da32eb120c8c290f637fe46fd01c17434ff66b011a79ed99780.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2aee5b5b-355d-42c4-b489-e2e83e6dfe7c\AgileDotNetRT.dll

    Filesize

    120KB

    MD5

    a29c3316f8e89dcfe7e9e853d7173527

    SHA1

    b5ff8f9f9298ac05f16fe715200ef6b06cfd4a98

    SHA256

    99cbe880112f80b7f7dffb285452694ac9a338e49d0e96584ea9ae1850fc59dd

    SHA512

    f83363abb8930d54be334a72932dea99e87ef2ff36b07b263a19743f2a8fbd11af310323837a863b51f99efd910c90d5b7373c9d3da1628de3888215197b4998

  • memory/2372-0-0x0000000073F5E000-0x0000000073F5F000-memory.dmp

    Filesize

    4KB

  • memory/2372-1-0x0000000000160000-0x00000000001A6000-memory.dmp

    Filesize

    280KB

  • memory/2372-9-0x0000000073CE0000-0x0000000073D13000-memory.dmp

    Filesize

    204KB

  • memory/2372-8-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB

  • memory/2372-10-0x0000000073D50000-0x0000000073DD0000-memory.dmp

    Filesize

    512KB

  • memory/2372-11-0x0000000073CE0000-0x0000000073D13000-memory.dmp

    Filesize

    204KB

  • memory/2372-12-0x0000000073F50000-0x000000007463E000-memory.dmp

    Filesize

    6.9MB