Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 20:13

General

  • Target

    101a1f29a5090087fe35a759eb7c94b6.exe

  • Size

    14.9MB

  • MD5

    101a1f29a5090087fe35a759eb7c94b6

  • SHA1

    45f7cc9f39e22a6cc37fad0b8480692bf4124c36

  • SHA256

    2f376a89c28d4002957d19e1a5945724ccc842c0b9d3fa619f42657ffc910fa6

  • SHA512

    fa2f942e733fce3b7861fff2d07cec01105a5ddf53fba9498aa385217e060ba87cb87159469aa66e68d86470223f99f97b4483ad368d08fb587af8e06ed6410a

  • SSDEEP

    393216:8RjeAy6tGbfjw3r+2S7avZ1vRK49ECOQIMnc:wLtGSaL7arj9EWIuc

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\101a1f29a5090087fe35a759eb7c94b6.exe
    "C:\Users\Admin\AppData\Local\Temp\101a1f29a5090087fe35a759eb7c94b6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\system32\cmd.exe
      cmd.exe /c "setup.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exe
        vcredist_x64.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:3060
  • C:\Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe
    "C:\Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.bat

    Filesize

    37B

    MD5

    ee5b968cbf9dd2ca42239b02acbc2db7

    SHA1

    985e71cc0b32a6b6288ddd04bda7f69b0ba4e0cd

    SHA256

    3453ba6b867ab90d8ca0b07150742bad54f4b99a2e0c7b540ce75f9d6ba993a8

    SHA512

    b3c6317e760b1a62a1564bf78d72985cb0ba0b19a243ff0777c4e72f66c2f2c90538b75b183f68806d7fd6d259935de2598cbee41070d4d6f3d86ea552671694

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exe

    Filesize

    221KB

    MD5

    9b6870c8a7433ca7df4a15eeaf4a7861

    SHA1

    abffcacc56fc2674cfc3a43960887538b17a7102

    SHA256

    6749e658ff957ef0acf70ab22eb3e186f9d4c03a0b791301926d1958ea53468f

    SHA512

    58d62f29a286afa4924bc43fe378b0722e33e5c569365f465e5ef83ce278d2126cae0a8ff40b38feac467e02c731bde30cf45efb473718f841e45bc451cf0dfc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exe

    Filesize

    189KB

    MD5

    cf1a0733c934b2d390bd1c75cee8ba40

    SHA1

    4d552781da2a701e80a29f0029db9a87dd50c49d

    SHA256

    36990828602a38e4baf7f57cf7956ed99dc9954018a34ffd5f2062dbd4cfa279

    SHA512

    5a2d5aa2ed67ad25d2a2ea3ba1689aaceca1641972a7886aa2520e52c9484b83669f67da7a479dbd395b93753c0cf4d024e2c52ba6a25e387ee9c9a0bb36abda

  • C:\Windows\Temp\{1300001E-CFF3-4949-A852-3B1D30DD45DB}\.ba\logo.png

    Filesize

    1KB

    MD5

    d6bd210f227442b3362493d046cea233

    SHA1

    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

    SHA256

    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

    SHA512

    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

  • C:\Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe

    Filesize

    82KB

    MD5

    e5ec12efaf20c9b7b50c23f06ba2e4ad

    SHA1

    22e9e7e80512ba6365b61155be767b744e01a2b3

    SHA256

    776d582d06ce492869150c66c729379cb2798ac1b04e9e24c55ba0a5b7c2c75a

    SHA512

    d0bd69a78823dd6b5f7fd9d99eecc69bc92ef109c7963c1e2491bbc27d9052c6ec71e639d800296733be2f4a4cb5da58d3d65b23a27113529c8ebd50731d4a06

  • C:\Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe

    Filesize

    138KB

    MD5

    e115ad4a9d11e5a528e3a4d2bf6cf020

    SHA1

    4a76228025c97209382b89030b1aaf6c093777ba

    SHA256

    e177078607db25bdaf8dfe98608a9f24c7932debd0082f59a2e1b248414edddb

    SHA512

    3c17c5579e7a18e961210d71389c99a207a978f64a27646bffbb484e8e0467cf41de1b8f486dbf8b549e8745eb37cae0a264780f10a82ed9e663b0032c469389

  • \Windows\Temp\{1300001E-CFF3-4949-A852-3B1D30DD45DB}\.ba\wixstdba.dll

    Filesize

    129KB

    MD5

    4ce40e1824f1c5485585b2f3f8ce0134

    SHA1

    497ab63876e38be76748d5c2a0bd369a24a8d398

    SHA256

    84bb764f8d0c476564c4b177e9820d41deaa480f58c9a02d601e4a18900ba939

    SHA512

    b51c831c307ef04097605308adec94df98d99642ec304ba9bee0f9f167f2efb7cfa5255b36cb26bb73f2d24bdfd77b71752d5747b8df6a0f74f31ecff2566233

  • \Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe

    Filesize

    125KB

    MD5

    6df9b0b336460cb9be610bffb1dedd13

    SHA1

    db3aeea2d7f6b675e48ae3aeca500637bd04b91f

    SHA256

    9eca112621462252234c4e3eba29cc0bcb8ae9ad6addb3178a2f07df24d46d6b

    SHA512

    c3ed52029d040cf77aed1f4a6b053f5b4ed6875aa76915a0046ec48359771e9c28e6b3b534425dad9a60ad6083f03c62ede05bf0e4417d9adfd33403e1fba30e