Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2024 22:29

General

  • Target

    COD Encoutered error/COD Encoutered error/Visual Retributions!/vcredist2015_2017_2019_x86.exe

  • Size

    13.7MB

  • MD5

    69551a0aba9be450ef30813456bbfe58

  • SHA1

    85354326ef8fbe908d9331446b8c8463577c5633

  • SHA256

    50a3e92ade4c2d8f310a2812d46322459104039b9deadbd7fdd483b5c697c0c8

  • SHA512

    f7a8578146a8666174adcffa8212eaddce8e433d7531c4704e2a35e7ce723f92b968e5b9df9c6662f351edd21317f929c04d23bf2b976642a92d663d0e3f5240

  • SSDEEP

    393216:Sr/wlptVYmfr7yBG/4fXw91bfPLnzgm7:SbMpttD7yBG/T91bnf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\COD Encoutered error\COD Encoutered error\Visual Retributions!\vcredist2015_2017_2019_x86.exe
    "C:\Users\Admin\AppData\Local\Temp\COD Encoutered error\COD Encoutered error\Visual Retributions!\vcredist2015_2017_2019_x86.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\Temp\{75D88305-582E-4844-B014-96D71D73946A}\.cr\vcredist2015_2017_2019_x86.exe
      "C:\Windows\Temp\{75D88305-582E-4844-B014-96D71D73946A}\.cr\vcredist2015_2017_2019_x86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\COD Encoutered error\COD Encoutered error\Visual Retributions!\vcredist2015_2017_2019_x86.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2852

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\{B3F34EDC-93F5-4440-B8F7-937C07E42E79}\.ba\logo.png
    Filesize

    1KB

    MD5

    d6bd210f227442b3362493d046cea233

    SHA1

    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

    SHA256

    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

    SHA512

    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

  • \Windows\Temp\{75D88305-582E-4844-B014-96D71D73946A}\.cr\vcredist2015_2017_2019_x86.exe
    Filesize

    632KB

    MD5

    85900a652ad68a9b2afaf8ed318f2f75

    SHA1

    cd88194055ba4d18747545fc80e1ceb3612033d3

    SHA256

    e5c0020e115c77403570a0ac0a71607bffaf26b7ca2a33b07ac447429820874b

    SHA512

    d2b542d1040718f3ed476ba49ca40aed508bb6df3eee17b036ea27c6ab1f38f6f97e7a53a971d611ccc0ba9c6b3e10e8b7bb0cec32c22d9ac6d80dbaa08a3c98

  • \Windows\Temp\{B3F34EDC-93F5-4440-B8F7-937C07E42E79}\.ba\wixstdba.dll
    Filesize

    191KB

    MD5

    eab9caf4277829abdf6223ec1efa0edd

    SHA1

    74862ecf349a9bedd32699f2a7a4e00b4727543d

    SHA256

    a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

    SHA512

    45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2